Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Multiple Vulnerabilities -01 Apr13 (Windows)

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

10 years ago

Modified

Modified

5 years ago

Summary

This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Insight

Insight

- Unspecified vulnerabilities in the browser engine - Buffer overflow in the Mozilla Maintenance Service - Not preventing origin spoofing of tab-modal dialogs - Untrusted search path vulnerability while handling dll files - Improper validation of address bar during history navigation - Integer signedness error in the 'pixman_fill_sse2' function in 'pixman-sse2.c' in Pixman - Error in 'CERT_DecodeCertPackage' function in Mozilla Network Security Services (NSS) - Improper handling of color profiles during PNG rendering in 'gfx.color_management.enablev4' - The System Only Wrapper (SOW) implementation does not prevent use of the cloneNode method for cloning a protected node

Affected Software

Affected Software

Mozilla Firefox version before 20.0 on Windows

Solution

Solution

Upgrade to Mozilla Firefox version 20.0 or later.