Kaspersky ID:
KLA71397
Дата обнаружения:
06/08/2024
Обновлено:
19/09/2024

Описание

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, cause denial of service, obtain sensitive information, execute arbitrary code, perform cross-site scripting attack, gain privileges.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability in the date picker can be exploited to spoof user interface and bypass security restrictions.
  2. Security UI vulnerability in select option on Android can be exploited to spoof user interface and bypass security restrictions.
  3. Security UI vulnerability in select option of fullscreen notification dialog can be exploited to spoof user interface.
  4. Out of bounds memory access vulnerability in graphics shared memory handling can be exploited to cause denial of service.
  5. Security vulnerability in PK11_Encrypt using CKM_CHACHA20 on Intel Sandy Bridge machines can exploited to obtain sensitive information.
  6. Use after free vulnerability in incomplete WebAssembly exception handing can be exploited to cause denial of service or execute arbitrary code.
  7. Security vulnerability in web extension with StreamFilter can be exploited to obtain sensitive information, cause denial of service or execute arbitrary code.
  8. Cross Site Scripting (XSS) vulnerability in Enhanced Tracking Protection can be exploited to execute arbitrary code and spoof user interface.
  9. Use after free vulnerability in IndexedDB can be exploited to cause denial of service or execute arbitrary code.
  10. Out of bounds read vulnerability in editor component can be exploited to cause denial of service.
  11. Use after free vulnerability in JavaScript code coverage collection can be exploited to cause denial of service or execute arbitrary code.
  12. Type confusion vulnerability in WebAssembly can be exploited to execute arbitrary code.
  13. Uninitialized memory vulnerability in ANGLE used by WebGL can be exploited to obtain sensitive information.
  14. Use after free vulnerability in JavaScript garbage collection can be exploited to cause denial of service or execute arbitrary code.
  15. Security vulnerability in Clipboard can be exploited to bypass security restrictions.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2024-7529
    high
  • CVE-2024-7523
    critical
  • CVE-2024-7518
    high
  • CVE-2024-7519
    critical
  • CVE-2024-7531
    high
  • CVE-2024-7521
    critical
  • CVE-2024-7525
    critical
  • CVE-2024-7524
    high
  • CVE-2024-7528
    critical
  • CVE-2024-7522
    critical
  • CVE-2024-7530
    critical
  • CVE-2024-7520
    critical
  • CVE-2024-7526
    high
  • CVE-2024-7527
    critical
  • CVE-2024-8900
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.