New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 6.7
SynopsisThe remote Windows host contains a web browser that is affected by multiple vulnerabilities.
DescriptionThe installed version of Firefox is earlier than 3.0.14. Such versions are potentially affected by the following security issues :
- Multiple memory corruption vulnerabilities could potentially allow arbitrary code execution.
- An insufficient warning message is displayed when adding or removing a PKCS11 module. In some cases, this can be done remotely. A remote attacker could exploit this by tricking a user into installing a malicious PKCS11 module, which could facilitate man-in-them-middle attacks.
- The columns of a XUL tree element can manipulated in a way that leads to a dangling pointer. A remote attacker could exploit this to execute arbitrary code. (MFSA 2009-49)
- A URL containing certain Unicode characters with tall line-height is displayed incorrectly in the location bar.
A remote attacker could use this to prevent a user from seeing the full URL of a malicious site. (MFSA 2009-50)
SolutionUpgrade to Firefox 3.0.14 or later