Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Multiple Vulnerabilities-01 Apr15 (Mac OS X)

Information

Severity

Severity

High

Family

Family

General

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

9 years ago

Modified

Modified

5 years ago

Summary

This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exist due to, - Improper restriction of resource: URLs. - Multiple unspecified errors. - No HTTPS session for lightweight theme add-on installations . - An out of bounds read error in the QCMS color management library. - An error that is triggered when handling specially crafted flash content, which can cause the cursor to become invisible. - An incorrect memory management for simple-type arrays in WebRTC. - An error in 'navigator.sendBeacon' implementation. - Two errors in 'Off Main Thread Compositing' implementation. - Two use-after-free errors in 'HTMLSourceElement::AfterSetAttr' function. - An error allowing to bypass the Same Origin Policy. - Use of docshell type information instead of page principal information for 'Window.webidl' access control.

Affected Software

Affected Software

Mozilla Firefox before version 37.0 on Mac OS X

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Firefox version 37.0 or later.