Kaspersky ID:
KLA12545
Дата обнаружения:
31/05/2022
Обновлено:
31/03/2025

Описание

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, cause denial of service, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Denial of service vulnerability can be exploited to cause denial of service.
  2. Security vulnerability can be exploited to bypass security restrictions.
  3. Denial of service vulnerability in WASM on arm64 can be exploited to cause denial of service.
  4. Heap buffer overflow vulnerability in WebGL can be exploited to cause denial of service.
  5. A remote code execution vulnerability can be exploited to execute arbitrary code.
  6. A memory corruption vulnerability can be exploited to execute arbitrary code.
  7. Spoof user interface vulnerability in fullscreen mode can be exploited to spoof user interface.
  8. Obtain sensitive information vulnerability in WebAuthn token can be exploited to obtain sensitive information.
  9. Denial of service vulnerability can be exploited to cause denial of service or execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2022-31736
    critical
  • CVE-2022-31747
    critical
  • CVE-2022-31740
    critical
  • CVE-2022-31737
    critical
  • CVE-2022-31744
    high
  • CVE-2022-1919
    critical
  • CVE-2022-31745
    warning
  • CVE-2022-31743
    high
  • CVE-2022-31741
    critical
  • CVE-2022-31738
    high
  • CVE-2022-31742
    high
  • CVE-2022-31739
    critical
  • CVE-2022-31748
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.