383
VMScore

CVE-2016-2822

Published: 13/06/2016 Updated: 30/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Mozilla Firefox prior to 47.0 and Firefox ESR 45.x prior to 45.2 allow remote malicious users to spoof the address bar via a SELECT element with a persistent menu.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 8.0

mozilla firefox esr 45.1.0

mozilla firefox esr 45.1.1

mozilla firefox

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

opensuse opensuse 13.1

opensuse leap 42.1

opensuse opensuse 13.2

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Multiple security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows and other implementation errors may lead to the execution of arbitrary code or spoofing Wait, Firefox? No more references to Iceweasel? That's right, Debian no longer applies a custom branding Please see these links for fur ...
Mozilla Foundation Security Advisory 2016-52 Addressbar spoofing though the SELECT element Announced June 7, 2016 Reporter Jordi Chancel Impact Moderate Products Firefox, Firefox ESR Fixed in ...
Mozilla Firefox before 470 and Firefox ESR 45x before 452 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu ...