Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.
[ { "events": [ { "introduced": "0" }, { "last_affected": "47.0.1" } ] } ]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-5260.json"