8.8
CVSSv3

CVE-2016-2831

Published: 13/06/2016 Updated: 30/10/2018
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.3 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

Mozilla Firefox prior to 47.0 and Firefox ESR 45.x prior to 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote malicious users to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

mozilla firefox esr 45.1.0

mozilla firefox esr 45.1.1

debian debian linux 8.0

opensuse leap 42.1

opensuse opensuse 13.2

opensuse opensuse 13.1

mozilla firefox

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Multiple security issues have been found in the Mozilla Firefox web browser: Multiple memory safety errors, buffer overflows and other implementation errors may lead to the execution of arbitrary code or spoofing Wait, Firefox? No more references to Iceweasel? That's right, Debian no longer applies a custom branding Please see these links for fur ...
Mozilla Foundation Security Advisory 2016-58 Entering fullscreen and persistent pointerlock without user permission Announced June 7, 2016 Reporter sushi Anton Larsson Impact High Products Firefox, Firefox ESR Fixed in ...
Mozilla Firefox before 470 and Firefox ESR 45x before 452 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site ...