Логотип exploitDog
bind:CVE-2020-6159
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-6159

Количество 2

Количество 2

nvd логотип

CVE-2020-6159

около 5 лет назад

URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-7hrc-g4hv-6p8r

больше 3 лет назад

URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-6159

URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.

CVSS3: 6.1
0%
Низкий
около 5 лет назад
github логотип
GHSA-7hrc-g4hv-6p8r

URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу