Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox ESR Security Updates(mfsa_2019-06_2019-08)-Windows

Information

Severity

Severity

High

Family

Family

General

CVSSv2 Base

CVSSv2 Base

8.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:S/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Mozilla Firefox ESR and is prone to multiple vulnerabilities.

Insight

Insight

The multiple flaws exists due to, - An Use-after-free error when removing in-use DOM elements. - Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey. - An error in IonMonkey just-in-time (JIT) compiler. - An improper bounds checks when Spectre mitigations are disabled. - Command line arguments not discarded during execution. - A type-confusion error in IonMonkey JIT compiler. - An use-after-free error with SMIL animation controller. - Windows programs that are not 'URL Handlers' are exposed to web content. - Memory safety bugs.

Affected Software

Affected Software

Mozilla Firefox ESR version before 60.6 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Firefox ESR version 60.6 or later. Please see the references for more information.