漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The getTip() method of Action Columns of Sencha Ext JS 4 to 6 before 6.6.0 is vulnerable to XSS attacks, even when passed HTML-escaped data. This framework brings no built-in XSS protection, so the developer has to ensure that data is correctly sanitized. However, the getTip() method of Action Columns takes HTML-escaped data and un-escapes it. If the tooltip contains user-controlled data, an attacker could exploit this to create a cross-site scripting attack, even when developers took precautions and escaped data.
漏洞信息
N/A
漏洞
N/A
漏洞
Sencha Ext JS 跨站脚本漏洞
漏洞信息
Sencha Ext JS是一款基于JavaScript的应用程序框架。该框架支持使用Ajax、DHTML和DOM脚本构建交互式跨平台Web应用程序。 Sencha Ext JS 4版本至6版本(6.6.0之前版本)中的Action Columns的getTip()方法存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意的Web脚本或HTML。
漏洞信息
N/A
漏洞
N/A