Kaspersky ID:
KLA12228
Bulunma tarihi:
07/13/2021
Yüklendi:
01/28/2026

Açıklama

Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A security bypass vulnerability in password autofill on Android can be exploited to bypass security restrictions and obtain sensitive information.
  2. A security bypass vulnerability on Android can be exploited to bypass security restrictions.
  3. A memory safety vulnerability can be exploited to execute arbitrary code.
  4. A use after free vulnerability can be exploited via special crafted webpage to cause denial of service or execute arbitrary code.
  5. An out of bounds write vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  6. A security UI vulnerability can be exploited to spoof user interface.
  7. A security bypass vulnerability in network partitioning can be exploited to bypass security restrictions.
  8. A use after free vulnerability in Cairo can be exploited to cause denial of service or execute arbitrary code.

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

İlgili ürünler

CVE Listesi

  • CVE-2021-30547
    critical
  • CVE-2021-29976
    critical
  • CVE-2021-29970
    critical
  • CVE-2021-29973
    critical
  • CVE-2021-29971
    critical
  • CVE-2021-29977
    critical
  • CVE-2021-29975
    high
  • CVE-2021-29974
    warning
  • CVE-2021-29972
    critical

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.