CVE-2020-6808 log

Source
Severity Medium
Remote Yes
Type Content spoofing
Description
A security issue has been found in Firefox before 74 where, when a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document.
Group Package Affected Fixed Severity Status Ticket
AVG-1112 firefox 73.0.1-1 74.0-1 Critical Fixed
Date Advisory Group Package Severity Description
11 Mar 2020 ASA-202003-8 AVG-1112 firefox Critical multiple issues
References
https://www.mozilla.org/en-US/security/advisories/mfsa2020-08/#CVE-2020-6808
https://bugzilla.mozilla.org/show_bug.cgi?id=1247968