Kaspersky ID:
KLA64088
Data de detecção:
02/20/2024
Atualizado:
01/28/2026

Descrição

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to obtain sensitive information, cause denial of service, spoof user interface, execute arbitrary code, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Invalid memory access vulnerability in the built-in profiler can be exploited to obtain sensitive information.
  2. Out-of-bounds memory read in networking channels can be exploited to cause denial of service.
  3. Information disclosure vulnerability in cache can be exploited to obtain sensitive information.
  4. Security UI vulnerability in Fullscreen Notification can be exploited to spoof user interface.
  5. Memory safety vulnerability can be exploited to execute arbitrary code.
  6. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  7. Information disclosure vulnerability can be exploited to obtain sensitive information.
  8. Security UI vulnerability can be exploited to spoof user interface.
  9. Security vulnerability can be exploited to bypass security restrictions.

Comunicados originais

Exploração

Public exploits exist for this vulnerability.

Produtos relacionados

Lista de CVE

  • CVE-2024-1556
    high
  • CVE-2024-1546
    critical
  • CVE-2024-1554
    critical
  • CVE-2024-1548
    warning
  • CVE-2024-1557
    critical
  • CVE-2024-1550
    high
  • CVE-2024-1551
    high
  • CVE-2024-1547
    high
  • CVE-2024-1555
    critical
  • CVE-2024-1549
    high
  • CVE-2024-1552
    critical
  • CVE-2024-1553
    critical

Saiba mais

Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com

Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!
Kaspersky Next:
cibersegurança redefinida
Saber mais
Novo Kaspersky!
Sua vida dgital merece proteção completa!
Saber mais
Do you want to save your changes?
Your message has been sent successfully.