{"id":"CVE-2019-11738","details":"If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.","modified":"2026-03-15T14:32:56.774437Z","published":"2019-09-27T18:15:11.600Z","related":["MGASA-2019-0268","SUSE-SU-2019:14246-1","SUSE-SU-2019:2545-1","SUSE-SU-2019:2620-1","openSUSE-SU-2019:2251-1","openSUSE-SU-2019:2260-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-25/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-26/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1452037"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"69.0"}]},{"events":[{"introduced":"0"},{"fixed":"68.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-11738.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}]}