Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Firefox Security Updates (MacOSX)-June 30 2020
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws exist due to, - AppCache manifest poisoning due to url encoded character processing. - Use-after-free in WebRTC VideoBroadcaster. - Memory corruption due to missing sign-extension for ValueTags on ARM64. - Information disclosure due to manipulated URL object. - Use-after-free in nsGlobalWindowInner. - Use-After-Free when trying to connect to a STUN server. - RSA Key Generation vulnerable to side-channel attack. - Add-On updates did not respect the same certificate trust rules as software updates. - Integer overflow in nsJPEGEncoder::emptyOutputBuffer. - DLL Hijacking due to searching %PATH% for a library. - WebRTC permission prompt could have been bypassed by a compromised content process. - Out of bound read in Date.parse(). - Memory safety bugs fixed in Firefox 78.
Affected Software
Affected Software
Mozilla Firefox version before 78 on MacOSX.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Mozilla Firefox version 78 or later, Please see the references for more information.