Description
Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions, spoof user interface.
Below is a complete list of vulnerabilities:
- Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Denial of service vulnerability in Text Selection can be exploited to cause denial of service.
- Use after free vulnerability in DocumentL10n::TranslateDocument can be exploited to cause denial of service or execute arbitrary code.
- Code execution vulnerability in svg element can be exploited to execute arbitrary code.
- Security bypass vulnerability in sourceMapURL can be exploited to bypass security restrictions.
- Use after free in NSSToken vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Denial of service vulnerability in complex regular expressions can be exploited to cause denial of service.
- A spoofing vulnerability in iframe can be exploited remotely to spoof user interface.
- Out of bounds memory write vulnerability in WebAuthN Extensions can be exploited to cause denial of service.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2022-28285 high
- CVE-2022-28289 critical
- CVE-2022-28287 high
- CVE-2022-28282 high
- CVE-2022-28284 critical
- CVE-2022-28288 critical
- CVE-2022-28283 high
- CVE-2022-1097 high
- CVE-2022-24713 critical
- CVE-2022-28286 high
- CVE-2022-28281 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!