Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-46873

Опубликовано: 22 дек. 2022
Источник: debian
EPSS Низкий

Описание

Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed108.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/#CVE-2022-46873

EPSS

Процентиль: 67%
0.0054
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 3 лет назад

Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.

CVSS3: 8.8
nvd
около 3 лет назад

Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.

CVSS3: 8.8
github
около 3 лет назад

Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.

CVSS3: 8.8
fstec
больше 5 лет назад

Уязвимость веб-браузера Firefox, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 67%
0.0054
Низкий