Kaspersky ID:
KLA62070
Erkennungsdatum:
11/21/2023
Aktualisiert:
03/26/2025

Beschreibung

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A spoofing vulnerability can be exploited remotely to spoof user interface.
  2. Memory safety vulnerability can be exploited to execute arbitrary code.
  3. Out of bounds memory access vulnerability in WebGL2 blitFramebuffer can be exploited to cause denial of service.
  4. Information disclosure vulnerability for X11 can be exploited to obtain sensitive information.
  5. Security feature bypass vulnerability can be exploited remotely to bypass security restrictions.
  6. Use after free vulnerability in ReadableByteStreamQueueEntry::Buffer can be exploited to cause denial of service or execute arbitrary code.
  7. Use after free vulnerability in MessagePort::Entangled can be exploited to cause denial of service or execute arbitrary code.
  8. Clickjacking permission prompts vulnerability in fullscreen transition can be exploited remotely to spoof user interface.

Ursprüngliche Informationshinweise

Betroffene Produkte

CVE Liste

  • CVE-2023-6211
    high
  • CVE-2023-6213
    critical
  • CVE-2023-6212
    critical
  • CVE-2023-6204
    high
  • CVE-2023-6208
    critical
  • CVE-2023-6209
    high
  • CVE-2023-6207
    critical
  • CVE-2023-6205
    high
  • CVE-2023-6206
    high
  • CVE-2023-6210
    high

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.