Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Mozilla Firefox could allow a remote attacker to execute arbitrary code on the system, caused by memory safety bugs within the browser engine. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the vulnerable system or cause a denial of service.
Mozilla Firefox could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free vulnerability. An iterator may become invalid when recursing through graphical layers while scrolling. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the vulnerable system or cause a denial of service.
Mozilla Firefox is vulnerable to cross-site scripting, caused by improper validation of user-supplied input when pasting attacker-controlled data into a contenteditable element. A remote attacker could exploit this vulnerability to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Mozilla Firefox could allow a remote attacker to conduct spoofing attacks, using an open redirect vulnerability. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the site displayed in the download file dialog to show the original site.
Mozilla
Refer to Mozilla advisory for the complete list of affected products and their respective patches.
https://www.mozilla.org/en-US/security/advisories/mfsa2020-42/