Description
Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Security UI vulnerability in Fullscreen notification can be exploited to spoof user interface.
- Memory corruption vulnerability in Garbage Collection can be exploited remotely to cause denial of service or execute arbitrary code.
- Data race vulnerability in font initialization can be exploited to obtain sensitive information or execute arbitrary code.
- Security vulnerability can be exploited to bypass security restrictions.
- Information disclosure vulnerability in Private Browsing on Andoroid can be exploited to obtain sensitive information.
- Out of bounds vulnerability in WebGL on macOS can be exploited to cause denial of service.
- Remote code execution vulnerability in Maintenance Service can be exploited remotely to execute arbitrary code.
- Memory corruption vulnerability in Garbage Collection compaction can be exploited remotely to cause denial of service or execute arbitrary code.
- Invalid free pointer in the memory manager can be remotely exploited to cause a denial of service or the execution of arbitrary code.
- Information disclosure vulnerability in Save As dialog on Windows can be exploited to obtain sensitive information.
- Security vulnerability in the ARM64 Ion compiler can be exploited to bypass security restrictions.
- Security vulnerability in the bind function can be exploited to bypass security restrictions.
- Security UI vulnerability in Fullscreen notification on Android can be exploited to spoof user interface.
- Use after free vulnerability in debugging APIs can be exploited to cause denial of service or execute arbitrary code.
- Remote code execution vulnerability can be exploited remotely to execute arbitrary code.
- Information disclosure vulnerability in WebExtension can be exploited to obtain sensitive information.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Double-free memory address vulnerability in libwebp can be exploited remotely to cause denial of service or execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2023-29533 warning
- CVE-2023-29544 high
- CVE-2023-29537 critical
- CVE-2023-29547 high
- CVE-2023-29546 high
- CVE-2023-29531 critical
- CVE-2023-29532 high
- CVE-2023-29535 high
- CVE-2023-29536 critical
- CVE-2023-29545 high
- CVE-2023-29548 high
- CVE-2023-29541 critical
- CVE-2023-29549 high
- CVE-2023-29534 critical
- CVE-2023-29543 critical
- CVE-2023-29542 critical
- CVE-2023-29539 critical
- CVE-2023-29540 high
- CVE-2023-29538 warning
- CVE-2023-29551 critical
- CVE-2023-29550 critical
- CVE-2023-1999 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!