Description
Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A vulnerability in 3D CSS can be exploited to spoof user interface;
- A memory corruption vulnerability can be exploited to execute arbitrary code;
- Memory corruption and vulnerability can be exploited to cause denial of service;
- A vulnerability related to session history can be exploited to security bypass restrictions;
- A integer overflow vulnerability can be exploited to security bypass restrictions;
- A race condition vulnerability in requestPointerLock() can be exploited to obtain sensitive information;
- A use-after-free vulnerability can be exploited to execute arbitrary code;
- A Null read vulnerability related to WebAssembly JIT can be exploited to cause denial of service;
- A vulnerability related to secure lock icon can be exploited to spoof user interface;
- A HTML injection vulnerability can be exploited to execute arbitrary code;
- A vulnerability related to FTP URL can be exploited to execute arbitrary code;
- A memory safety vulnerability related to Responsive Design Mode can be exploited to execute arbitrary code;
- Elevation of privilege vulnerability related to Blob URL can be exploited to gain privileges;
Original advisories
Related products
CVE list
- CVE-2021-23994 critical
- CVE-2021-29946 critical
- CVE-2021-29945 high
- CVE-2021-24002 critical
- CVE-2021-23998 high
- CVE-2021-23995 critical
- CVE-2021-23999 critical
- CVE-2021-23996 high
- CVE-2021-29947 critical
- CVE-2021-24001 warning
- CVE-2021-24000 warning
- CVE-2021-23997 critical
- CVE-2021-29944 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!