Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2h6h-f2x3-xhhh

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.

Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.

EPSS

Процентиль: 50%
0.00272
Низкий

Связанные уязвимости

ubuntu
около 11 лет назад

Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.

redhat
около 11 лет назад

Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.

nvd
около 11 лет назад

Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.

debian
около 11 лет назад

Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in ...

EPSS

Процентиль: 50%
0.00272
Низкий