9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
firefox is vulnerable to use-after-free vulnerability. Remote attackers can execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
rhn.redhat.com/errata/RHSA-2016-1912.html
www.debian.org/security/2016/dsa-3674
www.geeknik.net/7gr1u98b9
www.mozilla.org/security/announce/2016/mfsa2016-85.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
www.securityfocus.com/bid/93049
www.securitytracker.com/id/1036852
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=1284690
rhn.redhat.com/errata/RHSA-2016-1912.html
security.gentoo.org/glsa/201701-15
www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/#firefoxesr45.4
www.mozilla.org/security/advisories/mfsa2016-86/
www.mozilla.org/security/advisories/mfsa2016-88/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P