Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2529-rwp4-75f6

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

EPSS

Процентиль: 79%
0.01352
Низкий

8.8 High

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
redhat
больше 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
nvd
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
debian
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS f ...

oracle-oval
больше 7 лет назад

ELSA-2018-0061: thunderbird security update (IMPORTANT)

EPSS

Процентиль: 79%
0.01352
Низкий

8.8 High

CVSS3

Дефекты

CWE-74