漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Custom log-in and log-out locations are used-defined as jslob but were not checked to contain malicious protocol handlers. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize jslob content for those locations to avoid redirects to malicious content. No publicly available exploits are known.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
漏洞
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞
Open-Xchange AppSuite 跨站脚本漏洞
漏洞信息
Open-Xchange AppSuite是德国Open-Xchange公司的一套Web云桌面环境。该环境允许用户更直观的管理电子邮件、任务和文件等。 Open-Xchange AppSuite 存在安全漏洞,该漏洞源于自定义的登录和登出位置(jslob)没有对可能包含恶意协议处理程序的内容进行检查。
漏洞信息
N/A
漏洞
N/A