Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-22755

Опубликовано: 22 дек. 2022
Источник: debian
EPSS Низкий

Описание

By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed97.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-04/#CVE-2022-22755

EPSS

Процентиль: 67%
0.00542
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 3 года назад

By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.

CVSS3: 8.8
nvd
почти 3 года назад

By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.

CVSS3: 8.8
github
почти 3 года назад

By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.

CVSS3: 6.3
fstec
почти 4 года назад

Уязвимость браузера Mozilla Firefox, связанная с недостаточным контролем ресурса в период его существовования при преобразовании XML-документов, позволяющая нарушителю выполнить произвольный JavaScript-код

EPSS

Процентиль: 67%
0.00542
Низкий