Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Security Updates(mfsa_2020-01_2020-02)-Windows

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - A memory corruption error in parent process during new content process initialization on Windows. - Bypass of namespace CSS sanitization during pasting. - A type Confusion error in XPCVariant.cpp. - Windows Keyboard in Private Browsing Mode may retain word suggestions. - Python files could be inadvertently executed upon opening a download. - Content Security Policy not applied to XSL stylesheets applied to XML documents. - Heap address disclosure in parent process during content process initialization. - CSS sanitization does not escape HTML tags. - NSS may negotiate TLS 1.2 or below after a TLS 1.3 HelloRetryRequest had been sent. - Memory safety bugs.

Affected Software

Affected Software

Mozilla Firefox version before 72 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Firefox version 72 or later. Please see the references for more information.