Kaspersky ID:
KLA12449
Bulunma tarihi:
02/08/2022
Yüklendi:
01/28/2026

Açıklama

Multiple vulnerabilities were found in Mozilla Firefox ESR. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Elevation of privilege vulnerability in Maintenance (Updater) Service on Windows can be exploited to gain privileges.
  2. Information disclosure vulnerability in cross-origin responses can be exploited to obtain sensitive information.
  3. Memory safety vulnerability can be exploited to execute arbitrary code.
  4. Security bypass vulnerability in Web Extension’s Content Security Policy and frame-ancestors directive can be exploited to bypass security restrictions.
  5. Denial of service vulnerability in object state can be exploited via script execution to cause denial of service.
  6. Security bypass vulnerability in extensions can be exploited to bypass security restrictions.
  7. Code execution vulnerability in Drag&Drop can be exploited via special crafted image to execute arbitrary code.
  8. Security bypass vulnerability in iframe can be exploited via special crafted document to bypass security restrictions.

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

İlgili ürünler

CVE Listesi

  • CVE-2022-22763
    critical
  • CVE-2022-22753
    high
  • CVE-2022-22760
    high
  • CVE-2022-22764
    critical
  • CVE-2022-22754
    high
  • CVE-2022-22761
    critical
  • CVE-2022-22756
    critical
  • CVE-2022-22759
    critical

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.