Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-5260

Опубликовано: 05 авг. 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3
CVSS3: 6.5

Описание

Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.

РелизСтатусПримечание
devel

not-affected

48.0+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [48.0+build2-0ubuntu0.14.04.1]]
precise

released

48.0+build2-0ubuntu0.12.04.1
trusty

released

48.0+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [48.0+build2-0ubuntu0.14.04.1]
upstream

released

48
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

48.0+build2-0ubuntu0.16.04.1

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
precise

not-affected

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

not-affected

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

not-affected

Показывать по

4.3 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
больше 9 лет назад

Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.

CVSS3: 6.5
nvd
больше 9 лет назад

Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.

CVSS3: 6.5
debian
больше 9 лет назад

Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="passw ...

CVSS3: 6.5
github
больше 3 лет назад

Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.

fstec
больше 9 лет назад

Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

4.3 Medium

CVSS2

6.5 Medium

CVSS3