{"id":"CVE-2017-7846","details":"It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via \"View -\u003e Feed article -\u003e Website\" or in the standard format of \"View -\u003e Feed article -\u003e default format\". This vulnerability affects Thunderbird \u003c 52.5.2.","modified":"2026-04-16T06:18:26.196973551Z","published":"2018-06-11T21:29:12.060Z","related":["openSUSE-SU-2017:3433-1","openSUSE-SU-2017:3434-1","openSUSE-SU-2024:10601-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102258"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040123"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0061"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4075"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2017-30/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1411716"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-7846.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"fixed":"52.5.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}