Описание
Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, spoof user interface, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Out of bounds memory access vulnerability in graphics shared memory handling can be exploited to cause denial of service.
- Use after free vulnerability in incomplete WebAssembly exception handing can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in editor component can be exploited to cause denial of service.
- Cross Site Scripting (XSS) vulnerability in Enhanced Tracking Protection can be exploited to execute arbitrary code and spoof user interface.
- Security vulnerability in web extension with StreamFilter can be exploited to obtain sensitive information, cause denial of service or execute arbitrary code.
- Uninitialized memory vulnerability in ANGLE used by WebGL can be exploited to obtain sensitive information.
- Use after free vulnerability in JavaScript garbage collection can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in the date picker can be exploited to spoof user interface and bypass security restrictions.
- Security vulnerability in PK11_Encrypt using CKM_CHACHA20 on Intel Sandy Bridge machines can exploited to obtain sensitive information.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2024-7529 unknown
- CVE-2024-7519 unknown
- CVE-2024-7531 unknown
- CVE-2024-7521 unknown
- CVE-2024-7525 unknown
- CVE-2024-7524 unknown
- CVE-2024-7522 unknown
- CVE-2024-7526 unknown
- CVE-2024-7527 unknown
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!