Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Security Updates(mfsa_2019-21_2019-22)-Windows

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exist due to, - Sandbox escape via installation of malicious language pack. - Script injection within domain through inner window reuse. - A use-after-free issue with HTTP/2 cached stream. - NeckoChild can trigger crash when accessed off of main thread. - Empty or malformed p256-ECDH public keys may trigger a segmentation fault. - HTML parsing error can contribute to content XSS. - Sandbox can be bypassed as globalThis is not enumerable until accessed. - Improper escaping of caret character. - An out of bounds read issue when importing curve25519 private key. - Same-origin policy treats all files in a directory as having the same-origin. - Activity Stream writes unsanitized content to innerHTML. - Domain spoofing through unicode latin 'kra'. - Cookie leakage during fetching add-ons across private browsing boundaries. - Unnecessary troubleshooting permissions. - Bypassing of safebrowsing protections through websockets. - Port scanning through Alt-Svc header. - Memory safety bugs.

Affected Software

Affected Software

Mozilla Firefox versions before 68 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Firefox 68 or later. Please see the references for more information.