Описание
JavaScript in the "about:webrtc" page is not sanitized properly being assigned to "innerHTML". Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack. This vulnerability affects Firefox < 55.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 55.0.2+build1-0ubuntu4 |
| bionic | released | 55.0.2+build1-0ubuntu4 |
| cosmic | released | 55.0.2+build1-0ubuntu4 |
| devel | released | 55.0.2+build1-0ubuntu4 |
| disco | released | 55.0.2+build1-0ubuntu4 |
| eoan | released | 55.0.2+build1-0ubuntu4 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [55.0.1+build2-0ubuntu0.14.04.2]] |
| esm-infra/focal | DNE | |
| focal | released | 55.0.2+build1-0ubuntu4 |
| groovy | released | 55.0.2+build1-0ubuntu4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | ignored | end of standard support, was needs-triage |
| cosmic | DNE | |
| devel | DNE | |
| disco | DNE | |
| eoan | DNE | |
| esm-apps/bionic | ignored | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | DNE | |
| focal | DNE |
Показывать по
EPSS
4.3 Medium
CVSS2
6.1 Medium
CVSS3
Связанные уязвимости
JavaScript in the "about:webrtc" page is not sanitized properly being assigned to "innerHTML". Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack. This vulnerability affects Firefox < 55.
JavaScript in the "about:webrtc" page is not sanitized properly being assigned to "innerHTML". Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack. This vulnerability affects Firefox < 55.
JavaScript in the "about:webrtc" page is not sanitized properly being ...
JavaScript in the "about:webrtc" page is not sanitized properly being assigned to "innerHTML". Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack. This vulnerability affects Firefox < 55.
Уязвимость реализации механизма WebRTC (Web Real Time Communications) браузера Mozilla Firefox, позволяющая нарушителю проводить межсайтовые сценарные атаки
EPSS
4.3 Medium
CVSS2
6.1 Medium
CVSS3