CVE-2019-11744

Source
https://cve.org/CVERecord?id=CVE-2019-11744
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11744.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-11744
Downstream
Related
Published
2019-09-27T18:15:12.130Z
Modified
2026-03-12T23:00:10.199406Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11744.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "60.9"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "69.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "68.0"
            },
            {
                "fixed": "68.1"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "60.9"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "68.0"
            },
            {
                "fixed": "68.1"
            }
        ]
    }
]