Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Firefox Security Updates(mfsa_2018-15_2018-17)-Windows
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Mozilla Firefox and is prone to multiple vulnerabilities.
Insight
Insight
The multiple flaws exists due to, - Buffer overflow error using computed size of canvas element. - Multiple use-after-free errors. - Multiple integer overflow errors. - Same-origin bypass error using service worker and redirection. - Compromised IPC child process can list local filenames. - Media recorder segmentation fault error when track type is changed during capture. - Invalid data handling during QCMS transformations. - No warning when opening executable SettingContent-ms files. - Timing attack mitigation of PerformanceNavigationTiming. - WebExtensions bundled with embedded experiments were not correctly checked for proper authorization. - In Reader View SameSite cookie protections are not checked on exiting. - Memory safety bugs.
Affected Software
Affected Software
Mozilla Firefox version before 61 on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Mozilla Firefox version 61 or later. Please see the references for more information.