{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T09:27:17.085","vulnerabilities":[{"cve":{"id":"CVE-2022-46873","sourceIdentifier":"security@mozilla.org","published":"2022-12-22T20:15:46.027","lastModified":"2025-04-15T14:15:37.457","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108."},{"lang":"es","value":"Debido a que Firefox no implementó la directiva CSP <code>unsafe-hashes</code>, un atacante que pudo inyectar marcado en una página protegida por una Política de seguridad de contenido puede haber inyectado un script ejecutable. Esto estaría severamente limitado por la Política de seguridad de contenido especificada en el documento. Esta vulnerabilidad afecta a Firefox &lt; 108."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"108.0","matchCriteriaId":"9BB4BE02-7F35-4034-8C61-5DC921524F84"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1644790","source":"security@mozilla.org","tags":["Issue Tracking"]},{"url":"https://security.gentoo.org/glsa/202305-06","source":"security@mozilla.org"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-51/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1644790","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://security.gentoo.org/glsa/202305-06","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.mozilla.org/security/advisories/mfsa2022-51/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}