Açıklama
Multiple vulnerabilities were found in Mozilla Firefox and Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Use-after-free vulnerability in Mozilla Firefox can be exploited remotely via specially designed HTML5 stream to cause denial of service.
- Memory corruption vulnerability in Mozilla Firefox can be exploited remotely via specially designed JS code to cause denial of service.
- Out-of-bounds reading vulnerability can be exploited remotely via calling the graphic component to access the freed memory to obtain sensitive information.
- Inter-process Communication (IPC) vulnerability can be exploited remotely via attempt to communicate with the IPC object without validation to bypass security restrictions.
- Vulnerability in Mozilla Firefox related to auto-proxy configuration setting can be exploited locally to bypass security restrictions.
- Multiple memory corruption vulnerabilities can be exploited remotely to execute arbitrary code.
Orijinal öneriler
Kötüye kullanma
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
İlgili ürünler
CVE Listesi
- CVE-2018-18500 critical
- CVE-2018-18503 critical
- CVE-2018-18504 critical
- CVE-2018-18505 critical
- CVE-2018-18506 high
- CVE-2018-18502 critical
- CVE-2018-18501 critical
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!