{"id":"CVE-2016-2818","details":"Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.","modified":"2026-04-16T06:17:04.701112815Z","published":"2016-06-13T10:59:01.540Z","related":["SUSE-SU-2016:1691-1","SUSE-SU-2016:1799-1","SUSE-SU-2016:2061-1","openSUSE-SU-2016:1769-1","openSUSE-SU-2016:1778-1","openSUSE-SU-2024:10071-1","openSUSE-SU-2024:10230-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/91075"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3600"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3647"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2016/mfsa2016-49.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2993-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3023-1"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036057"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1217"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1392"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1261230"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1256493"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1273701"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1234147"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1263384"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1264575"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1265577"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1256739"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1256968"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1261752"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1267130"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1273202"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1269729"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2818.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"45.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"45.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"46.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"12"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}