Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-0061

Опубликовано: 08 янв. 2018
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2018-0061: thunderbird security update (IMPORTANT)

[52.5.2-1.0.1]

  • Replaced thunderbird-redhat-default-prefs.js with thunderbird-oracle-default-prefs.js

[52.5.2-1]

  • Update to 52.5.2

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

thunderbird

52.5.2-1.0.1.el6_9

Oracle Linux i686

thunderbird

52.5.2-1.0.1.el6_9

Oracle Linux 7

Oracle Linux x86_64

thunderbird

52.5.2-1.0.1.el7_4

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
redhat
больше 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
nvd
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
debian
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS f ...

CVSS3: 8.8
github
около 3 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.