Описание
Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, cause denial of service, obtain sensitive information, execute arbitrary code, perform cross-site scripting attack, gain privileges.
Below is a complete list of vulnerabilities:
- Security UI vulnerability in the date picker can be exploited to spoof user interface and bypass security restrictions.
- Security UI vulnerability in select option on Android can be exploited to spoof user interface and bypass security restrictions.
- Security UI vulnerability in select option of fullscreen notification dialog can be exploited to spoof user interface.
- Out of bounds memory access vulnerability in graphics shared memory handling can be exploited to cause denial of service.
- Security vulnerability in PK11_Encrypt using CKM_CHACHA20 on Intel Sandy Bridge machines can exploited to obtain sensitive information.
- Use after free vulnerability in incomplete WebAssembly exception handing can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in web extension with StreamFilter can be exploited to obtain sensitive information, cause denial of service or execute arbitrary code.
- Cross Site Scripting (XSS) vulnerability in Enhanced Tracking Protection can be exploited to execute arbitrary code and spoof user interface.
- Use after free vulnerability in IndexedDB can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in editor component can be exploited to cause denial of service.
- Use after free vulnerability in JavaScript code coverage collection can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in WebAssembly can be exploited to execute arbitrary code.
- Uninitialized memory vulnerability in ANGLE used by WebGL can be exploited to obtain sensitive information.
- Use after free vulnerability in JavaScript garbage collection can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in Clipboard can be exploited to bypass security restrictions.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2024-7529 high
- CVE-2024-7523 critical
- CVE-2024-7518 high
- CVE-2024-7519 critical
- CVE-2024-7531 high
- CVE-2024-7521 critical
- CVE-2024-7525 critical
- CVE-2024-7524 high
- CVE-2024-7528 critical
- CVE-2024-7522 critical
- CVE-2024-7530 critical
- CVE-2024-7520 critical
- CVE-2024-7526 high
- CVE-2024-7527 critical
- CVE-2024-8900 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!