Описание
Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | thunderbird | Not affected | ||
Red Hat Enterprise Linux 6 | thunderbird | Not affected | ||
Red Hat Enterprise Linux 5 | firefox | Fixed | RHSA-2012:1088 | 17.07.2012 |
Red Hat Enterprise Linux 5 | xulrunner | Fixed | RHSA-2012:1088 | 17.07.2012 |
Red Hat Enterprise Linux 6 | firefox | Fixed | RHSA-2012:1088 | 17.07.2012 |
Red Hat Enterprise Linux 6 | xulrunner | Fixed | RHSA-2012:1088 | 17.07.2012 |
Показывать по
Дополнительная информация
Статус:
4.3 Medium
CVSS2
Связанные уязвимости
Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do ...
Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
4.3 Medium
CVSS2