4.3
CVSSv3

CVE-2016-1965

Published: 13/03/2016 Updated: 27/12/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 45.0 and Firefox ESR 38.x prior to 38.7 mishandle a navigation sequence that returns to the original page, which allows remote malicious users to spoof the address bar via vectors involving the history.back method and the location.protocol property.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox esr 38.6.0

mozilla firefox esr 38.5.1

mozilla firefox esr 38.0.5

mozilla firefox esr 38.0.1

mozilla firefox esr 38.3.0

mozilla firefox esr 38.2.1

mozilla firefox esr 38.6.1

mozilla firefox esr 38.2.0

mozilla firefox esr 38.1.1

mozilla firefox esr 38.1.0

mozilla firefox esr 38.5.0

mozilla firefox esr 38.4.0

mozilla firefox esr 38.0

mozilla firefox

opensuse opensuse 13.1

oracle linux 6

oracle linux 5.0

oracle linux 7

Vendor Advisories

Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, denial of service, address bar spoofing and overwriting local files For the oldstable distribution ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-2917-1 introduced several regressions in Firefox ...
USN-2917-1 introduced several regressions in Firefox ...
Mozilla Foundation Security Advisory 2016-28 Addressbar spoofing though history navigation and Location protocol property Announced March 8, 2016 Reporter Tsubasa Iinuma Impact Moderate Products Firefox, Firefox ESR Fi ...
Mozilla Firefox before 450 and Firefox ESR 38x before 387 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the historyback method and the locationprotocol property ...