Описание
The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 42.0+build2-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [42.0+build2-0ubuntu0.14.04.1]] |
| precise | released | 42.0+build2-0ubuntu0.12.04.1 |
| trusty | released | 42.0+build2-0ubuntu0.14.04.1 |
| trusty/esm | DNE | trusty was released [42.0+build2-0ubuntu0.14.04.1] |
| upstream | released | 42.0 |
| vivid | released | 42.0+build2-0ubuntu0.15.04.1 |
| wily | released | 42.0+build2-0ubuntu0.15.10.1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
The Reader View implementation in Mozilla Firefox before 42.0 has an i ...
The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
Уязвимость браузера Firefox, позволяющая нарушителю обойти существующие ограничения доступа и провести межсайтовое выполнение сценариев
EPSS
4.3 Medium
CVSS2