Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7846

Опубликовано: 22 дек. 2017
Источник: redhat
CVSS3: 8.8

Описание

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1530187Mozilla: JavaScript Execution via RSS in mailbox:// origin

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
nvd
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS3: 8.8
debian
около 7 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS f ...

CVSS3: 8.8
github
около 3 лет назад

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

oracle-oval
больше 7 лет назад

ELSA-2018-0061: thunderbird security update (IMPORTANT)

8.8 High

CVSS3