Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mozilla Firefox Security Updates (Windows)-June 30 2020

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exist due to, - AppCache manifest poisoning due to url encoded character processing. - Use-after-free in WebRTC VideoBroadcaster. - Memory corruption due to missing sign-extension for ValueTags on ARM64. - Information disclosure due to manipulated URL object. - Use-after-free in nsGlobalWindowInner. - Use-After-Free when trying to connect to a STUN server. - RSA Key Generation vulnerable to side-channel attack. - Add-On updates did not respect the same certificate trust rules as software updates. - Integer overflow in nsJPEGEncoder::emptyOutputBuffer. - DLL Hijacking due to searching %PATH% for a library. - WebRTC permission prompt could have been bypassed by a compromised content process. - Out of bound read in Date.parse(). - Memory safety bugs fixed in Firefox 78.

Affected Software

Affected Software

Mozilla Firefox version before 78 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Mozilla Firefox version 78 or later. Please see the references for more information.