Kaspersky ID:
KLA11516
Erkennungsdatum:
07/09/2019
Aktualisiert:
01/28/2026

Beschreibung

Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, perform cross-site scripting attack, spoof user interface, obtain sensitive information, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Multiple sandbox escape vulnerabilities can be exploited to bypass security restrictions;
  2. A CORS bypass vulnerability can be exploited to bypass security restrictions;
  3. An use-after-free vulnerability can be exploited to cause denial of service;
  4. A race condition vulnerability can be exploited to cause denial of service;
  5. A HTML parsing error can be exploited to perform cross-site scripting attack;
  6. An improper escape issue can be exploited to spoof user interface;
  7. An out-of-bounds read vulnerabilitiy can be exploited to obtain sensitive information;
  8. A same-origin policy issue can be exploited to obtain sensitive information;
  9. Multiple memory corruptions vulnerabilities can be exploited remotely to execute arbitrary code.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Betroffene Produkte

CVE Liste

  • CVE-2019-9811
    critical
  • CVE-2019-11711
    critical
  • CVE-2019-11712
    critical
  • CVE-2019-11713
    critical
  • CVE-2019-11729
    critical
  • CVE-2019-11715
    high
  • CVE-2019-11717
    high
  • CVE-2019-11719
    critical
  • CVE-2019-11730
    high
  • CVE-2019-11709
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.