Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-7840

Опубликовано: 11 июн. 2018
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3
CVSS3: 6.1

Описание

JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57.

РелизСтатусПримечание
artful

released

57.0+build4-0ubuntu0.17.10.5
bionic

released

57.0.1+build2-0ubuntu1
devel

released

57.0.1+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [57.0+build4-0ubuntu0.14.04.4]]
precise/esm

DNE

trusty

released

57.0+build4-0ubuntu0.14.04.4
trusty/esm

DNE

trusty was released [57.0+build4-0ubuntu0.14.04.4]
upstream

released

57.0
xenial

released

57.0+build4-0ubuntu0.16.04.5
zesty

released

57.0+build4-0ubuntu0.17.04.5

Показывать по

EPSS

Процентиль: 70%
0.00633
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 7 лет назад

JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57.

CVSS3: 6.1
debian
больше 7 лет назад

JavaScript can be injected into an exported bookmarks file by placing ...

CVSS3: 6.1
github
больше 3 лет назад

JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox < 57.

CVSS3: 6.1
fstec
больше 8 лет назад

Уязвимость браузера Mozilla Firefox, связанная с недостатками используемых мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки

EPSS

Процентиль: 70%
0.00633
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3