Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Firefox Security Updates(mfsa_2020-54_2020-56)-Windows
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws exist due to, - Operations on a BigInt could have caused uninitialized memory to be exposed. - Heap buffer overflow in WebGL. - Use-After-Free in WebGL. - CSS Sanitizer performed incorrect sanitization. - Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free. - Malicious applications on Android could have induced Firefox for Android into sending arbitrary attacker-specified headers. - HTTPS pages could have been intercepted by a registered service worker when they should not have been. - URL spoofing via unresponsive port in Firefox for Android. - Internal network hosts could have been probed by a malicious webpage. - When entering an address in the address or search bars, a website could have redirected the user before they were navigated to the intended url. - The proxy.onRequest API did not catch view-source URLs. - Opening an extension-less download may have inadvertently launched an executable instead. - Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6. - Memory safety bugs fixed in Firefox 84.
Affected Software
Affected Software
Mozilla Firefox version before 84 on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Mozilla Firefox version 84 or later, Please see the references for more information.