Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.814932
Kategorie:General
Titel:Mozilla Firefox Security Updates(mfsa_2019-04_2019-05)-MAC OS X
Zusammenfassung:Mozilla Firefox is prone to multiple vulnerabilities.
Beschreibung:Summary:
Mozilla Firefox is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws are due to:

- A use-after-free vulnerability in the Skia library can occur when
creating a path, leading to a potentially exploitable crash.

- An integer overflow vulnerability in the Skia library can occur after
specific transform operations, leading to a potentially exploitable crash

- Cross-origin images can be read from a canvas element in violation
of the same-origin policy using the transferFromImageBitmap method.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to cause denial of service.

Affected Software/OS:
Mozilla Firefox version before 65.0.1 on MAC OS X.

Solution:
Upgrade to Mozilla Firefox version 65.0.1
or later. Please see the references for more information.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-1835
XForce ISS Database: ibm-dejaviewone-cve20181835-xxe(150514)
https://exchange.xforce.ibmcloud.com/vulnerabilities/150514
Common Vulnerability Exposure (CVE) ID: CVE-2019-5785
https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
https://crbug.com/899689
Common Vulnerability Exposure (CVE) ID: CVE-2018-1851
BugTraq ID: 105839
http://www.securityfocus.com/bid/105839
XForce ISS Database: ibm-websphere-cve20181851-rce(150999)
https://exchange.xforce.ibmcloud.com/vulnerabilities/150999
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.