Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7846

Опубликовано: 11 июн. 2018
Источник: debian
EPSS Низкий

Описание

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
thunderbirdfixed1:52.5.2-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2017-30/#CVE-2017-7846

EPSS

Процентиль: 79%
0.01352
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
redhat
больше 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
nvd
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
github
около 3 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

oracle-oval
больше 7 лет назад

ELSA-2018-0061: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 79%
0.01352
Низкий