The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
The Mozilla Windows updater modifies some files to be updated by reading the original file and applying changes to it. The location of the original file can be altered by a malicious user by passing a special path to the callback parameter through the Mozilla Maintenance Service, allowing the manipulation of files in the installation directory and privilege escalation by manipulating the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR < 52.2 and Firefox < 54.
Base Score: 4.6
Impact Score: 6.4
Exploitability Score: 3.9
Base Score: 7.8
Impact Score: 5.9
Exploitability Score: 1.8
|100885||openSUSE Security Update : Mozilla based packages (openSUSE-2017-712)||Nessus||SuSE Local Security Checks|
|100810||Mozilla Firefox < 54 Multiple Vulnerabilities||Nessus||Windows|
|100809||Mozilla Firefox ESR < 52.2 Multiple Vulnerabilities||Nessus||Windows|
|100808||Mozilla Firefox < 54 Multiple Vulnerabilities (macOS)||Nessus||MacOS X Local Security Checks|
|100807||Mozilla Firefox ESR < 52.2 Multiple Vulnerabilities (macOS)||Nessus||MacOS X Local Security Checks|
|700134||Mozilla Firefox < 54 Multiple Vulnerabilities||Nessus Network Monitor||Web Clients|
|100775||FreeBSD : mozilla -- multiple vulnerabilities (6cec1b0a-da15-467d-8691-1dea392d4c8d)||Nessus||FreeBSD Local Security Checks|