Kaspersky ID:
KLA11545
検出日:
09/03/2019
更新日:
01/28/2026

説明

Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, perform cross-site scripting attack, bypass security restrictions, gain privileges.

Below is a complete list of vulnerabilities:

  1. A vulnerability can be exploited remotely to execute arbitrary code;
  2. Multiple memory corruption vulnerabilities can be exploited to execute arbitrary code;
  3. A vulnerability can be exploited remotely to perform cross-site scripting attacks;
  4. A sandbox escape vulnerability can be exploited to bypass security restrictions;
  5. A type confusion vulnerability can be exploited to cause denial of service;
  6. A same-origin policy violation vulnerability can be exploited to bypass security restrictions;
  7. Multiple race condition vulnerabilities in Mozilla Maintenance Service can be exploited to gain privileges;
  8. A vulnerability in WebRTC can be exploited to bypass security restrictions;
  9. Multiple use-after-free vulnerabilities can be exploited remotely to cause denial of service;
  10. A cross-origin access vulnerability can be exploited to bypass security restrictions;

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

関連製品

CVEリスト

  • CVE-2019-11751
    critical
  • CVE-2019-11752
    critical
  • CVE-2019-11735
    critical
  • CVE-2019-11746
    critical
  • CVE-2019-9812
    critical
  • CVE-2019-11750
    high
  • CVE-2019-11742
    high
  • CVE-2019-11738
    high
  • CVE-2019-11749
    warning
  • CVE-2019-11753
    critical
  • CVE-2019-11736
    high
  • CVE-2019-11748
    high
  • CVE-2019-11740
    critical
  • CVE-2019-11747
    high
  • CVE-2019-11744
    high
  • CVE-2019-11743
    warning

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.