Описание
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.
Релиз | Статус | Примечание |
---|---|---|
artful | released | 1:52.6.0+build1-0ubuntu0.17.10.1 |
devel | released | 1:52.6.0+build1-0ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1:52.6.0+build1-0ubuntu0.14.04.1]] |
precise/esm | DNE | |
trusty | released | 1:52.6.0+build1-0ubuntu0.14.04.1 |
trusty/esm | DNE | trusty was released [1:52.6.0+build1-0ubuntu0.14.04.1] |
upstream | released | 52.5.2 |
xenial | released | 1:52.6.0+build1-0ubuntu0.16.04.1 |
zesty | ignored | end of life |
Показывать по
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.
It is possible to execute JavaScript in the parsed RSS feed when RSS f ...
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.
EPSS
6.8 Medium
CVSS2
8.8 High
CVSS3