CVE-2019-11720

Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox < 68.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

02 Mar 2023, 16:23

Type Values Removed Values Added
CPE cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
References (GENTOO) https://security.gentoo.org/glsa/201908-12 - (GENTOO) https://security.gentoo.org/glsa/201908-12 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html - Mailing List, Third Party Advisory

Information

Published : 2019-07-23 14:15

Updated : 2024-02-04 20:20


NVD link : CVE-2019-11720

Mitre link : CVE-2019-11720

CVE.ORG link : CVE-2019-11720


JSON object : View

Products Affected

mozilla

  • firefox

opensuse

  • leap
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')