Description
Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, bypass security restrictions, execute arbitrary code, cause denial of service, perform cross-site scripting attack.
Below is a complete list of vulnerabilities:
- Information disclosure vulnerability in Cloud Clipboard for Windows can be exploited to obtain sensitive information.
- Security UI vulnerability can be exploited to spoof user interface or obtain sensitive information.
- Security vulnerability in iframe sandbox rules can be exploited to bypass security restrictions.
- Code execution vulnerability for MacOS can be exploited via special .inetloc files to execute arbitrary code.
- Use after free vulnerability in file picker dialog can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass security restrictions and spoof user interface.
- Security bypass vulnerability in HTTP2 can be exploited to bypass security restrictions.
- Security UI vulnerability in Javascript alert box can be exploited to spoof user interface.
- Information disclosure vulnerability in ‘Copy Image Link’ context menu can be exploited to obtain sensitive information.
- Security UI vulnerability can be exploited to spoof user interface.
- Universal cross-site scripting (XSS) vulnerability in Firefox for Android via special crafted QR Code URL can be exploited to perform cross-site scripting attack.
- Security bypass vulnerability in Web Extensions can be exploited to bypass security restrictions.
Original advisories
Related products
CVE list
- CVE-2021-38505 high
- CVE-2021-38506 warning
- CVE-2021-38503 critical
- CVE-2021-38510 critical
- CVE-2021-38504 critical
- CVE-2021-38508 warning
- CVE-2021-38507 high
- CVE-2021-38509 warning
- CVE-2021-43532 high
- CVE-2021-43533 warning
- CVE-2021-43530 high
- CVE-2021-43531 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!