Kaspersky ID:
KLA20049
Fecha de detección:
11/15/2022
Actualizado:
01/28/2026

Descripción

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to cause denial of service, spoof user interface, bypass security restrictions, obtain sensitive information, execute arbitrary code, gain privileges, perform cross-site scripting attack.

Below is a complete list of vulnerabilities:

  1. Denial of service vulnerability in Symlinks can be exploited cause denial of service.
  2. Security UI vulnerability in Custom cursor can be exploited to spoof user interface.
  3. Security vulnerability in TLS certificate can be exploited to bypass security restrictions.
  4. Information disclosure vulnerability in Side-Channel can be exploited to obtain sensitive information.
  5. Use after free vulnerability in JavaScript Realm can be exploited to cause denial of service or execute arbitrary code.
  6. Security vulnerability in Service Workers area can be exploited to bypass security restrictions.
  7. Security UI vulnerability in window.print can be exploited to spoof user interface.
  8. Elevation of privilege vulnerability in S.browser_fallback_url can be exploited remotely to gain privileges.
  9. Information disclosure vulnerability in Service Workers can be exploited to obtain sensitive information.
  10. Use after free vulnerability in FontFace can be exploited to cause denial of service.
  11. Security bypass vulnerability in Trace can be exploited to perform cross-site scripting attack.
  12. Security UI vulnerability in windowName can be exploited to spoof user interface.
  13. Security UI vulnerability in iframe can be exploited to spoof user interface.
  14. Use after free vulnerability in InputStream can be exploited to cause denial of service or execute arbitrary code.
  15. Use after free vulnerability in Garbage Collection can be exploited to cause denial of service or execute arbitrary code.
  16. Code execution vulnerability can be exploited to execute arbitrary code.
  17. Memory safety vulnerability can be exploited to execute arbitrary code.
  18. Use after free vulnerability in expat can be exploited to cause denial of service.

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Productos relacionados

Lista CVE

  • CVE-2022-40674
    critical
  • CVE-2022-45412
    critical
  • CVE-2022-45418
    high
  • CVE-2022-45419
    high
  • CVE-2022-45416
    high
  • CVE-2022-45406
    critical
  • CVE-2022-45403
    high
  • CVE-2022-45404
    high
  • CVE-2022-45413
    high
  • CVE-2022-45417
    warning
  • CVE-2022-45407
    critical
  • CVE-2022-45411
    high
  • CVE-2022-45408
    high
  • CVE-2022-45420
    high
  • CVE-2022-45405
    high
  • CVE-2022-45410
    high
  • CVE-2022-45409
    critical
  • CVE-2022-45415
    critical
  • CVE-2022-45421
    critical
  • CVE-2022-46883
    critical

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.