firefox is vulnerable to arbitrary code execution. The vulnerability exists as a flaw was found in the way Firefox parsed certain Scalable Vector Graphics (SVG) image files that contained eXtensible Style Sheet language Transformations (XSLT). A web page containing a malicious SVG image file could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.
lists.opensuse.org/opensuse-security-announce/2012-02/msg00003.html
lists.opensuse.org/opensuse-security-announce/2012-02/msg00007.html
lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html
www.debian.org/security/2012/dsa-2400
www.debian.org/security/2012/dsa-2402
www.debian.org/security/2012/dsa-2406
www.mandriva.com/security/advisories?name=MDVSA-2012:013
www.mozilla.org/security/announce/2012/mfsa2012-08.html
www.mozilla.org/security/known-vulnerabilities/firefox36.html#firefox3.6.26
www.securityfocus.com/bid/51754
access.redhat.com/errata/RHSA-2012:0079
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=701806
bugzilla.mozilla.org/show_bug.cgi?id=702466
exchange.xforce.ibmcloud.com/vulnerabilities/72868
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14618