Kaspersky ID:
KLA12497
Дата обнаружения:
05/04/2022
Обновлено:
27/01/2024

Описание

Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
  2. Use after free vulnerability in VR Process can be exploited to cause denial of service or execute arbitrary code.
  3. Memory safety vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability in DocumentL10n::TranslateDocument can be exploited to cause denial of service or execute arbitrary code.
  5. Use after free in NSSToken vulnerability can be exploited to cause denial of service or execute arbitrary code.
  6. Denial of service vulnerability in complex regular expressions can be exploited to cause denial of service.
  7. A spoofing vulnerability in iframe can be exploited remotely to spoof user interface.
  8. Out of bounds memory write vulnerability in WebAuthN Extensions can be exploited to cause denial of service.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2022-28285
    high
  • CVE-2022-28289
    critical
  • CVE-2022-28282
    high
  • CVE-2022-1097
    high
  • CVE-2022-24713
    critical
  • CVE-2022-28286
    high
  • CVE-2022-28281
    critical
  • CVE-2022-1196
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.