NoScript Classic before 5.1.8.7, as used in Tor Browser 7.x and other products, allows attackers to bypass script blocking via the text/html;/json Content-Type value.
References
Link | Resource |
---|---|
https://noscript.net/getit#classic | Release Notes |
https://twitter.com/Zerodium/status/1039127214602641409 | Third Party Advisory |
https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/ | Third Party Advisory |
https://noscript.net/getit#classic | Release Notes |
https://twitter.com/Zerodium/status/1039127214602641409 | Third Party Advisory |
https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://noscript.net/getit#classic - Release Notes | |
References | () https://twitter.com/Zerodium/status/1039127214602641409 - Third Party Advisory | |
References | () https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/ - Third Party Advisory |
Information
Published : 2018-09-13 04:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16983
Mitre link : CVE-2018-16983
CVE.ORG link : CVE-2018-16983
JSON object : View
Products Affected
noscript
- noscript
torproject
- tor_browser
CWE