Описание
Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Security vulnerability in Developer Tools can be exploited to bypass security restrictions.
- Denial of service vulnerability in Web Crypto can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Denial of service vulnerability in printing subsystem can be exploited to cause denial of service.
- Security UI vulnerability in full-screen mode can be exploited to spoof user interface.
- Information disclosure vulnerability can be exploited to obtain sensitive information.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Security vulnerability can be exploited to bypass security restrictions.
- Out of bounds memory write vulnerability in inputStream can be exploited to cause denial of service.
- Remote code execution vulnerability in SVGUtils can be exploited remotely to execute arbitrary code and cause denial of service.
- Security vulnerability in GetTableSelectionMode can be exploited to bypass security restrictions.
- Use after free vulnerability in SpiderMonkey can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in Image drag and drop can be exploited to bypass security restrictions.
- Information disclosure vulnerability in CSP header can be exploited to obtain sensitive information.
- Use after free vulnerability in ScriptLoadContext can be exploited to cause denial of service or execute arbitrary code.
- Denial of service vulnerability in TaskbarPreviewCallback can be exploited to cause denial of service.
- Remote code execution vulnerability in NSS can be exploited remotely to execute arbitrary code.
- Security UI vulnerability can be exploited to spoof user interface.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2023-25731 critical
- CVE-2023-25742 high
- CVE-2023-25745 critical
- CVE-2023-25738 high
- CVE-2023-25730 high
- CVE-2023-25734 critical
- CVE-2023-25744 critical
- CVE-2023-25729 critical
- CVE-2023-25732 critical
- CVE-2023-25737 critical
- CVE-2023-25736 critical
- CVE-2023-25735 critical
- CVE-2023-25740 critical
- CVE-2023-25741 high
- CVE-2023-25728 high
- CVE-2023-25739 critical
- CVE-2023-25733 critical
- CVE-2023-0767 critical
- CVE-2023-25743 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!