First published: Mon Jun 13 2016(Updated: )
Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Mozilla Firefox | <=46.0.1 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2833 has been classified as a moderate severity vulnerability due to its potential to facilitate cross-site scripting (XSS) attacks.
To mitigate CVE-2016-2833, it is recommended to update Mozilla Firefox to version 47.0 or later.
CVE-2016-2833 affects all versions of Mozilla Firefox prior to 47.0.
CVE-2016-2833 impacts multiple operating systems that run unaffected versions of Mozilla Firefox, including Ubuntu and openSUSE.
CVE-2016-2833 enables remote attackers to conduct cross-site scripting (XSS) attacks via crafted Java applets.