CVSS Base Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Summary: This host is installed with Mozilla Firefox
and is prone to security bypass vulnerability.
Detection Method: Checks if a vulnerable version is present on
the target host.
Technical Details: The flaw exists due to insufficient vetting
of parameters passed with the Prompt:Open IPC message between child and parent
Impact: Successful exploitation will allow remote
attackers to bypass sandbox restrictions.
Affected Versions: Mozilla Firefox version before 67.0.4
on MAC OS X.
Recommendations: Upgrade to Mozilla Firefox version 67.0.4
or later. Please see the references for more information.
Solution Type: Vendor Patch
Detection Type: Executable
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
ImageMagick < 7.0.9-0 Denial of Service (DoS) Vulnerability (Windows)
ImageMagick < 7.0.9-0 Denial of Service (DoS) Vulnerability (Linux)
ImageMagick < 7.0.9-0 Denial of Service (DoS) Vulnerability (Mac OS X)
Adobe Bridge CC Security Updates (apsb19-53)-Mac OS X
Adobe Media Encoder Security Updates(APSB19-52)-Windows
Adobe Bridge CC Security Updates (apsb19-53)-Windows
Adobe Animate Privilege Escalation Vulnerability-Windows (apsb19-34)
Adobe Illustrator Multiple Vulnerabilities-Windows (apsb19-36)
Fedora Update for putty FEDORA-2019-f0d1f795c7
Fedora Update for kernel-tools FEDORA-2019-7a3fc17778
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.