First published: Tue Sep 20 2016(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <45.4 | 45.4 |
Mozilla Firefox ESR | <45.4 | 45.4 |
Mozilla Firefox | <49 | 49 |
Mozilla Firefox | <=48.0.2 | |
Mozilla Firefox | =45.0.2 | |
Mozilla Firefox ESR | =45.0 | |
Mozilla Firefox ESR | =45.0.1 | |
Mozilla Firefox ESR | =45.1.1 | |
Mozilla Firefox ESR | =45.2.0 | |
Mozilla Firefox ESR | =45.3.0 | |
Mozilla Firefox | =45.0 | |
Mozilla Firefox | =45.0.1 | |
Mozilla Firefox | =45.1.1 | |
Mozilla Firefox | =45.2.0 | |
Mozilla Firefox | =45.3.0 | |
debian/firefox | 134.0.2-2 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.6.0esr-1~deb11u3 128.5.0esr-1~deb12u1 128.6.0esr-1~deb12u1 128.6.0esr-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2016-5281.
The severity of CVE-2016-5281 is critical with a CVSS score of 9.8.
Mozilla Firefox versions before 49.0, Firefox ESR versions before 45.4, and Thunderbird versions before 45.4 are affected.
Remote attackers can exploit CVE-2016-5281 by levering improper interaction between JavaScript code and an SVG document, resulting in the execution of arbitrary code.
Yes, the remedies include updating to Mozilla Firefox version 49.0 or higher, Firefox ESR version 45.4 or higher, and Thunderbird version 45.4 or higher.