### [CVE-2016-9900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2045.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2050.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Restricted%20external%20resources%20can%20be%20loaded%20by%20SVG%20images%20through%20data%20URLs&color=brighgreen) ### Description External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6. ### POC #### Reference - https://bugzilla.mozilla.org/show_bug.cgi?id=1319122 #### Github No PoCs found on GitHub currently.