Vulnerability Details

Mozilla Firefox Security Advisory (MFSA2019-25) - Linux

Published: 2021-11-08 15:21:25
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

severity_vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

severity_origin=NVD

severity_date=2019-10-04 18:15:00 +0000 (Fri, 04 Oct 2019)

Summary:
This host is missing a security update for Mozilla Firefox.

Detection Method:
Checks if a vulnerable Linux Distribution Package version is present on the target host.

Technical Details:
CVE-2019-11751: Malicious code execution through command line parameters Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. Note: this issue only affects Firefox on Windows operating systems. CVE-2019-11746: Use-after-free while manipulating video A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML Some HTML elements, such as and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. CVE-2019-11736: File manipulation and privilege escalation in Mozilla Maintenance Service The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected. CVE-2019-11753: Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced ... [Please see the references for more information on the vulnerabilities]</p> <p class="mb-3" style="font-size: .900rem!important;"><b class="text-dark" style="font-size: .955rem!important; font-weight:600;">Affected Versions:</b> <br />Firefox version(s) below 69.</p> <p class="mb-3" style="font-size: .900rem!important;"><b class="text-dark" style="font-size: .955rem!important; font-weight:600;">Recommendations:</b> <br />The vendor has released an update. Please see the reference(s) for more information.</p> <p class="mb-3" style="font-size: .900rem!important;"><b class="text-dark" style="font-size: .955rem!important; font-weight:600;">Solution Type:</b> <br />Vendor Patch</p> <p class="mb-3" style="font-size: .900rem!important;"><b class="text-dark" style="font-size: .955rem!important; font-weight:600;">Detection Type:</b> <br />Executable Unreliable</p> <b class="text-dark" style="font-size: .955rem!important; font-weight:600;">NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)</b> <p class="mb-3" style="font-size: .900rem!important;"> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11734" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11734" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11734</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11735" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11735" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11735</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11736" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11736" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11736</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11737" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11737" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11737</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11738" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11738" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11738</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11740" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11740</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11741" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11741" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11741</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11742" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11742</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11743" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11743</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11744" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11744</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11746" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11746</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11747" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11747" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11747</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11748" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11748" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11748</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11749" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11749" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11749</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11750" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11750" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11750</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11751" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11751" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11751</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11752" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11752</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11753" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11753" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11753</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-11758" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-11758</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-5849" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-5849" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-5849</a> <br /> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812" title="NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database) CVE ID: CVE-2019-9812" target="_blank" rel="noopener">https://nvd.nist.gov/vuln/detail/CVE-2019-9812</a> <br /> </p> <b class="text-dark" style="font-size: .955rem!important; font-weight:600;">References:</b> <p class="mb-3" style="font-size: .900rem!important;"> <a href="" title="" target="_blank" rel="noopener"></a> <br /> <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/" title="https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/" target="_blank" rel="noopener">https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/</a> <br /> <a href="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1352875%2C1557208%2C1560641" title="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1352875%2C1557208%2C1560641" target="_blank" rel="noopener">https://bugzilla.mozilla.org/buglist.cgi?bug_id=1352875%2C1557208%2C1560641</a> <br /> <a href="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358" title="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358" target="_blank" rel="noopener">https://bugzilla.mozilla.org/buglist.cgi?bug_id=1561404%2C1561484%2C1568047%2C1561912%2C1565744%2C1568858%2C1570358</a> <br /> <a href="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160" title="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160" target="_blank" rel="noopener">https://bugzilla.mozilla.org/buglist.cgi?bug_id=1563133%2C1573160</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1388015" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1388015" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1388015</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1452037" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1452037" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1452037</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1501152" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1501152" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1501152</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1536227" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1536227" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1536227</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1538008" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1538008" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1538008</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1538015" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1538015" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1538015</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1539595" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1539595" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1539595</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1551913" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1551913" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1551913</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1552206" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1552206" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1552206</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1555838" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1555838" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1555838</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1559715" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1559715" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1559715</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1560495" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1560495" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1560495</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1562033" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1562033" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1562033</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1564449" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1564449" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1564449</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1564481" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1564481" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1564481</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1564588" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1564588" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1564588</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1565374" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1565374" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1565374</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1568397" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1568397" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1568397</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1572838" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1572838" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1572838</a> <br /> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1574980" title="https://bugzilla.mozilla.org/show_bug.cgi?id=1574980" target="_blank" rel="noopener">https://bugzilla.mozilla.org/show_bug.cgi?id=1574980</a> <br /> <a href="https://w3c.github.io/navigation-timing" title="https://w3c.github.io/navigation-timing" target="_blank" rel="noopener">https://w3c.github.io/navigation-timing</a> <br /> </p> </div> <!-- Description --> </div> <div class="col-lg-4"> <div data-toggle="sticky" data-sticky-offset="30"> <div class="card" id="card-summary"> <div class="card-header py-3"> <div class="row align-items-center"> <div class="col-6"> <span class="h6">Severity</span> </div> <div class="col-6 text-right"> <span class="badge badge-pill badge-soft-danger">High</span> </div> </div> </div> <div class="card-header py-3"> <div class="row align-items-center"> <div class="col-6"> <span class="h6">CVSS Score</span> </div> <div class="col-6 text-right"> <span class="badge badge-pill badge-soft-info"> 9.3 </span> </div> </div> </div> <div class="card-header py-3"> <div class="row align-items-center"> <div class="col-6"> <span class="h6">Published</span> </div> <div class="col-6 text-right"> 2021-11-08 </div> </div> </div> <div class="card-header py-3"> <div class="row align-items-center"> <div class="col-6"> <span class="h6">Modified</span> </div> <div class="col-6 text-right"> 2021-11-15 </div> </div> </div> <div class="card-header py-3"> <div class="row align-items-center"> <div class="col-6"> <span class="h6">Category</span> </div> <div class="col-6 text-right"> General </div> </div> </div> </div> </div> </div> </div> </div> </section> <!-- CTA --> <!-- Features (v5) --> <section class="slice slice-xl has-floating-items bg-gradient-primary" id=sct-call-to-action> <a href="#sct-call-to-action" class="tongue tongue-up tongue-section-secondary" data-scroll-to> <i class="fas fa-angle-up"></i> </a> <div class="container text-center"> <div class="row"> <div class="col-12"> <h2 class="text-white">Free Vulnerability Scanning, Assessment and Management</h2> <div class="row justify-content-center mt-4"> <div class="col-lg-8"> <p class="lead text-white"> Mageni's Platform is packed with all the features you need to scan, assess and manage vulnerabilities like this - it is free, open source, lightning fast, reliable and scalable. </p> <div class="btn-container mt-5"> <a href="https://www.mageni.net/register" class="btn btn-outline-white rounded-pill btn-icon hover-translate-y-n3 mb-4 mb-md-0"> <span class="btn-inner--icon"> <i class="fas fa-download"></i> </span> <span class="btn-inner--text">Download Now</span> </a> </div> </div> </div> </div> </div> </div> <div class="container floating-items"> <div class="icon-floating bg-white floating"> <span></span> <img alt="Router" src="https://www.mageni.net/assets/img/icons/essential/detailed/Router.svg" class="svg-inject"> </div> <div class="icon-floating icon-lg bg-white floating"> <span></span> <img alt="Servers" src="https://www.mageni.net/assets/img/icons/essential/detailed/Servers_2.svg" class="svg-inject"> </div> <div class="icon-floating icon-sm bg-white floating"> <span></span> <img alt="Laptop" src="https://www.mageni.net/assets/img/icons/essential/detailed/Laptop.svg" class="svg-inject"> </div> <div class="icon-floating icon-lg bg-white floating"> <span></span> <img alt="Database" src="https://www.mageni.net/assets/img/icons/essential/detailed/Database.svg" class="svg-inject"> </div> <div class="icon-floating bg-white floating"> <span></span> <img alt="Group" src="https://www.mageni.net/assets/img/icons/essential/detailed/Group_2.svg" class="svg-inject"> </div> <div class="icon-floating icon-sm bg-white floating"> <span></span> <img alt="Cloud" src="https://www.mageni.net/assets/img/icons/essential/detailed/Save_to_Cloud.svg" class="svg-inject"> </div> </div> </section> <!-- Answers --> <section class="slice slice-lg bg-section-secondary"> <div class="container"> <div class="mb-5 text-center"> <h3 class=" mt-4">Frequently Asked Questions</h3> </div> <div class="row"> <div class="col-xl-6"> <div id="accordion-1" class="accordion accordion-spaced"> <!-- Accordion card 1 --> <div class="card"> <div class="card-header py-4" id="heading-1-1" data-toggle="collapse" role="button" data-target="#collapse-1-1" aria-expanded="false" aria-controls="collapse-1-1"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>Do you limit the number of concurrent scans?</h6> </div> <div id="collapse-1-1" class="collapse" aria-labelledby="heading-1-1" data-parent="#accordion-1"> <div class="card-body"> <p>No, you can scan concurrently as many assets as you want. Please note that you must be aware of the hardware requeriments of the platform to ensure a good performance.</p> </div> </div> </div> <!-- Accordion card 2 --> <div class="card"> <div class="card-header py-4" id="heading-1-2" data-toggle="collapse" role="button" data-target="#collapse-1-2" aria-expanded="false" aria-controls="collapse-1-2"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>Do you limit the number of assets?</h6> </div> <div id="collapse-1-2" class="collapse" aria-labelledby="heading-1-2" data-parent="#accordion-1"> <div class="card-body"> <p>No, you can add as many assest as you want. It doesn't matters if you have millions of assets, we won't charge you for that.</p> </div> </div> </div> <!-- Accordion card 3 --> <div class="card"> <div class="card-header py-4" id="heading-1-3" data-toggle="collapse" role="button" data-target="#collapse-1-3" aria-expanded="false" aria-controls="collapse-1-3"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>Will I ever be charged to use the software?</h6> </div> <div id="collapse-1-3" class="collapse" aria-labelledby="heading-1-3" data-parent="#accordion-1"> <div class="card-body"> <p>No. The software is completely free. We have no intention to charge you to use the software, in fact - it completely goes against our beliefs and business model.</p> </div> </div> </div> <!-- Accordion card 4 --> <div class="card"> <div class="card-header py-4" id="heading-1-4" data-toggle="collapse" role="button" data-target="#collapse-1-4" aria-expanded="false" aria-controls="collapse-1-4"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>What's a vulnerability?</h6> </div> <div id="collapse-1-4" class="collapse" aria-labelledby="heading-1-4" data-parent="#accordion-1"> <div class="card-body"> <p>A vulnerability is defined in the ISO 27002 standard as “A weakness of an asset or group of assets that can be exploited by one or more threats” (International Organization for Standardization, 2005)</p> </div> </div> </div> </div> </div> <div class="col-xl-6"> <div id="accordion-2" class="accordion accordion-spaced"> <!-- Accordion card 1 --> <div class="card"> <div class="card-header py-4" id="heading-2-1" data-toggle="collapse" role="button" data-target="#collapse-2-1" aria-expanded="false" aria-controls="collapse-2-1"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>How can you offer this for free?</h6> </div> <div id="collapse-2-1" class="collapse" aria-labelledby="heading-2-1" data-parent="#accordion-2"> <div class="card-body"> <p>We generate revenue by providing support and other services for customers that require a subscription so they get guaranteed support and enterprise services. To use Mageni's Platform is completely free, with no limits at all.</p> </div> </div> </div> <!-- Accordion card 2 --> <div class="card"> <div class="card-header py-4" id="heading-2-2" data-toggle="collapse" role="button" data-target="#collapse-2-2" aria-expanded="false" aria-controls="collapse-2-2"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>Do you offer enterprise and professional support?</h6> </div> <div id="collapse-2-2" class="collapse" aria-labelledby="heading-2-2" data-parent="#accordion-2"> <div class="card-body"> <p> Yes. Mageni understands that there are professionals and businesses that need commercial support so Mageni provides an active support subscription with everything needed to run Mageni's Platform reliably and securely. More than software, it's access to security experts, knowledge resources, security updates, and support tools you can't get anywhere else. The subscription includes: </p> <ul> <li><b>Ongoing delivery</b> <ul> <li>Patches</li> <li>Bug fixes</li> <li>Updates</li> <li>Upgrades</li> </ul> </li> <li><b>Technical support</b> <ul> <li>24/7 availability</li> <li>Unlimited Incidents</li> <li>Specialty-based routing</li> <li>Multi-Channel</li> </ul> </li> <li><b>Commitments</b> <ul> <li>Software certifications</li> <li>Software assurance</li> <li>SLA</li> </ul> </li> </ul> </div> </div> </div> <!-- Accordion card 3 --> <div class="card"> <div class="card-header py-4" id="heading-2-3" data-toggle="collapse" role="button" data-target="#collapse-2-3" aria-expanded="false" aria-controls="collapse-2-3"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>Do you store my vulnerability information on your servers?</h6> </div> <div id="collapse-2-3" class="collapse" aria-labelledby="heading-2-3" data-parent="#accordion-2"> <div class="card-body"> <p>No, we don't store the information of your vulnerabilities in our servers.</p> </div> </div> </div> <!-- Accordion card 4 --> <div class="card"> <div class="card-header py-4" id="heading-2-4" data-toggle="collapse" role="button" data-target="#collapse-2-4" aria-expanded="false" aria-controls="collapse-2-4"> <h6 class="mb-0"><i class="far fa-question-circle mr-3"></i>What's vulnerability management?</h6> </div> <div id="collapse-2-4" class="collapse" aria-labelledby="heading-2-4" data-parent="#accordion-2"> <div class="card-body"> <p> Vulnerability management is the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization. <i>The term vulnerability management is often confused with vulnerability scanning. Despite the fact both are related, there is an important difference between the two.</i> Vulnerability scanning consists of using a computer program to identify vulnerabilities in networks, computer infrastructure or applications. Vulnerability management is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc. Source: "Implementing a Vulnerability Management Process". SANS Institute. </p> </div> </div> </div> </div> </div> </div> </div> </section> <section class="slice slice-lg"> <div class="container"> <div class="row justify-content-center align-items-center"> <div class="col-lg-8 text-center"> <h3 class="font-weight-400">I am ready to start scanning for vulnerabilities</h3> <div class="mt-5"> <a href="https://www.mageni.net/register" class="btn btn-outline-primary rounded-pill btn-icon hover-translate-y-n3 mb-4 mb-md-0"> <span class="btn-inner--icon"> <i class="fas fa-download"></i> </span> <span class="btn-inner--text">Download Now</span> </a> </div> </div> </div> </div> </section> </div> <footer id="footer-main"> <div class="footer footer-dark bg-gradient-primary"> <div class="container"> <div class="row pt-md"> <div class="col-lg-4 mb-5 mb-lg-0"> <a href="https://www.mageni.net"> <img src="https://www.mageni.net/assets/img/logo.svg" alt="Footer logo" width="150px;" height="50px;"> </a> <p>Mageni means "My Defender" and provides a Free Vulnerability Scanning and Management Platform which helps you to find, prioritize, remediate and manage the vulnerabilities. </p> </div> <div class="col-lg-2 col-6 col-sm-4 ml-lg-auto mb-5 mb-lg-0"> <h6 class="heading mb-3">Links</h6> <ul class="list-unstyled"> <li><a href="https://www.mageni.net/home">Dashboard</a></li> <li><a href="https://www.mageni.net/register">Download</a></li> <li><a href="https://documentation.mageni.net/" target="_blank">Docs</a></li> <li><a href="https://opensource.mageni.net/" target="_blank">Open Source</a></li> </ul> </div> <div class="col-lg-2 col-6 col-sm-4 mb-5 mb-lg-0"> <h6 class="heading mb-3">Product</h6> <ul class="list-unstyled text-small"> <li><a href="/">Overview</a></li> <li><a href="https://www.mageni.net/features">Features</a></li> <li><a href="https://www.mageni.net/pricing">Pricing</a></li> <li><a href="https://www.mageni.net/vulnerability">Plugins</a></li> <li><a href="https://www.mageni.net/categories">Categories</a></li> <li><a href="https://www.mageni.net/cve">CVE Database</a></li> </ul> </div> <div class="col-lg-2 col-sm-4 mb-5 mb-lg-0"> <h6 class="heading mb-3">Company</h6> <ul class="list-unstyled"> <li><a href="https://www.mageni.net/terms-of-service">Terms</a></li> <li><a href="https://www.mageni.net/terms-of-service">Legal</a></li> <li><a href="https://www.mageni.net/terms-of-service">GDPR</a></li> <li><a href="https://www.mageni.net/terms-of-service">Privacy</a></li> <li><a href="https://www.mageni.net/terms-of-service">Cookies</a></li> <li><a href="https://www.mageni.net/contact">Contact</a></li> </ul> </div> </div> <div class="row align-items-center justify-content-md-between py-4 mt-4 delimiter-top"> <div class="col-md-6"> <div class="copyright text-sm font-weight-bold text-center text-md-left"> © 2021 <a href="https://www.mageni.net" class="font-weight-bold" target="_blank">Mageni Security, LLC</a> </div> </div> <div class="col-md-6"> <ul class="nav justify-content-center justify-content-md-end mt-3 mt-md-0"> <li class="nav-item"> <a class="nav-link" href="https://www.linkedin.com/company/mageni-security" rel="noopener" target="_blank"> <i class="fab fa-linkedin"></i> </a> </li> <li class="nav-item"> <a class="nav-link" href="https://twitter.com/magenisecurity" rel="noopener" target="_blank"> <i class="fab fa-twitter"></i> </a> </li> <li class="nav-item"> <a class="nav-link" href="https://www.facebook.com/magenillc" rel="noopener" target="_blank"> <i class="fab fa-facebook"></i> </a> </li> </ul> </div> </div> </div> </div> </footer> <script rel="preload" src="https://www.mageni.net/assets/js/purpose.core.js"></script> <script rel="preload" src="https://www.mageni.net/assets/libs/swiper/dist/js/swiper.min.js"></script> <script rel="preload" src="https://www.mageni.net/assets/js/purpose.js"></script> <script rel="preload" src="https://www.mageni.net/assets/libs/bootstrap-notify/bootstrap-notify.min.js"></script> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=UA-56829758-1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-56829758-1'); </script> <!--Start of Tawk.to Script--> <script type="text/javascript"> var Tawk_API=Tawk_API||{}, Tawk_LoadStart=new Date(); (function(){ var s1=document.createElement("script"),s0=document.getElementsByTagName("script")[0]; s1.async=true; s1.src='https://embed.tawk.to/5ceab20aa667a0210d598126/default'; s1.charset='UTF-8'; s1.setAttribute('crossorigin','*'); s0.parentNode.insertBefore(s1,s0); })(); </script> <!--End of Tawk.to Script--> <!-- Go to www.addthis.com/dashboard to customize your tools --> <script type="text/javascript" src="//s7.addthis.com/js/300/addthis_widget.js#pubid=ra-606b2b274b8b3ef9"></script> </body> </html>