Kaspersky ID:
KLA11919
Detekováno:
07/28/2020
Aktualizováno:
01/28/2026

Popis

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, cause denial of service, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Overriding file type vulnerability can be exploited to bypass security restrictions and obtain sensitive information.
  2. Security vulnerability can be exploited to bypass security restrictions.
  3. Security vulnerability can be exploited to obtain sensitive information and bypass security restrictions.
  4. Security vulnerability can be exploited to bypass same origin policy.
  5. Type confusion vulnerability can be exploited to cause denial of service.
  6. Memory safety vulnerability can be exploited to execute arbitrary code.
  7. Implementation vulnerability in WebRTC can be exploited to potentially denial of service.
  8. DLL hijacking vulnerability on Windows can be exploited to bypass security restrictions.
  9. Security UI vulnerabiloty in CSS can be exploited to spoff user interface.
  10. Use after free vulnerability in ANGLE component can be exploited to potentially cause denial of service.

Oficiální doporučení

Vykořisťování

Public exploits exist for this vulnerability.

Související produkty

seznam CVE

  • CVE-2020-6463
    critical
  • CVE-2020-6514
    high
  • CVE-2020-15658
    high
  • CVE-2020-15653
    high
  • CVE-2020-15652
    high
  • CVE-2020-15655
    high
  • CVE-2020-15656
    critical
  • CVE-2020-15659
    critical
  • CVE-2020-15657
    critical
  • CVE-2020-15654
    high

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.