{"id":"CVE-2017-7840","details":"JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox \u003c 57.","modified":"2026-05-04T08:19:22.730210Z","published":"2018-06-11T21:29:11.827Z","withdrawn":"2026-05-04T08:19:22.730210Z","related":["openSUSE-SU-2024:10600-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2017-24/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/101832"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1039803"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1366420"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-7840.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"56.0.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}