Description
Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to bypass security restrictions, inject malicious code, execute arbitrary code, obtain sensitive information, spoof user interface, cause denial of service.
Below is a complete list of vulnerabilities:
- Security vulnerability in Symlinks can be exploited to bypass security restrictions.
- Security vulnerability in VideoBridge can be exploited to bypass security restrictions.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Use after free vulnerability in PR_GetIdentitiesLayer can be exploited to execute arbitrary code.
- Information disclosure vulnerability in EncryptingOutputStreams can be exploited to obtain sensitive information.
- Clickjacking permission prompts vulnerability in popup transition can be exploited remotely to spoof user interface.
- Heap buffer overflow vulnerability in nsTextFragment can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in nsWindow::PickerOpen(void) can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in WebGL ACE can be exploited to execute arbitrary code.
- Security vulnerability in ShutdownObserver can be exploited to bypass security restrictions.
- Use after free vulnerability in nsDNSService can be exploited to execute arbitrary code.
Original advisories
Related products
CVE list
- CVE-2023-6857 high
- CVE-2023-6860 high
- CVE-2023-6864 critical
- CVE-2023-6859 critical
- CVE-2023-6865 high
- CVE-2023-6867 high
- CVE-2023-6858 critical
- CVE-2023-6861 critical
- CVE-2023-6856 critical
- CVE-2023-6863 critical
- CVE-2023-6862 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!