First published: Fri Aug 05 2016(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <45.4 | 45.4 |
Mozilla Thunderbird | <45.4 | 45.4 |
Mozilla Firefox | <=47.0.1 | |
debian/firefox | 132.0.1-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.4.0esr-1~deb11u1 128.3.1esr-1~deb12u1 128.4.0esr-1~deb12u1 128.3.1esr-2 128.4.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-5250 is a vulnerability that allows remote attackers to obtain sensitive information about previously retrieved webpages in Mozilla Firefox, Firefox ESR, and Thunderbird.
CVE-2016-5250 has a severity level of medium.
Remote attackers can exploit CVE-2016-5250 by making Resource Timing API calls to obtain sensitive information about previously loaded webpages.
Mozilla Firefox before version 48.0, Firefox ESR before version 45.4, and Thunderbird before version 45.4 are affected by CVE-2016-5250.
To fix CVE-2016-5250, it is recommended to update Mozilla Firefox, Firefox ESR, and Thunderbird to version 48.0, 45.4, and 45.4 respectively.