Kaspersky ID:
KLA12228
Data de detecção:
07/13/2021
Atualizado:
01/28/2026

Descrição

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A security bypass vulnerability in password autofill on Android can be exploited to bypass security restrictions and obtain sensitive information.
  2. A security bypass vulnerability on Android can be exploited to bypass security restrictions.
  3. A memory safety vulnerability can be exploited to execute arbitrary code.
  4. A use after free vulnerability can be exploited via special crafted webpage to cause denial of service or execute arbitrary code.
  5. An out of bounds write vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  6. A security UI vulnerability can be exploited to spoof user interface.
  7. A security bypass vulnerability in network partitioning can be exploited to bypass security restrictions.
  8. A use after free vulnerability in Cairo can be exploited to cause denial of service or execute arbitrary code.

Comunicados originais

Exploração

Public exploits exist for this vulnerability.

Produtos relacionados

Lista de CVE

  • CVE-2021-30547
    critical
  • CVE-2021-29976
    critical
  • CVE-2021-29970
    critical
  • CVE-2021-29973
    critical
  • CVE-2021-29971
    critical
  • CVE-2021-29977
    critical
  • CVE-2021-29975
    high
  • CVE-2021-29974
    warning
  • CVE-2021-29972
    critical

Saiba mais

Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com

Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!
Kaspersky Next:
cibersegurança redefinida
Saber mais
Novo Kaspersky!
Sua vida dgital merece proteção completa!
Saber mais
Do you want to save your changes?
Your message has been sent successfully.