CVE-2020-6808
25.03.2020, 22:15
When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document. This vulnerability affects Firefox < 74.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 < 74.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||||||||||||||||||
mozjs38 |
| ||||||||||||||||||||||||||
mozjs52 |
| ||||||||||||||||||||||||||
mozjs60 |
|
Common Weakness Enumeration