ძიება მხარდაჭერაში

ნუ გაებმებით თაღლითების მახეში მხარდაჭერის საიტზე. აქ არასდროს მოგთხოვენ სატელეფონო ნომერზე დარეკვას, შეტყობინების გამოგზავნას ან პირადი მონაცემების გაზიარებას. გთხოვთ, გვაცნობოთ რამე საეჭვოს შემჩნევისას „დარღვევაზე მოხსენების“ მეშვეობით.

ვრცლად

What about vulnerability KLA10852?

  • 2 პასუხი
  • 1 მომხმარებელი წააწყდა მსგავს სიძნელეს
  • 14 ნახვა
  • ბოლოს გამოეხმაურა jscher2000 - Support Volunteer

Kaspersky brought up this vulnerability in Firefox, and it contains 22 vulnerabilities! Are we fixing them?

   An improper network connection handling can be exploited remotely via traffic overview to obtain sensitive information;
   Multiple unknown vulnerabilities at the browser engine can be exploited remotely to cause denial of service or possibly execute arbitrary code;
   Buffer overflow vulnerability at ClearKey Content Decryption Module can be exploited remotely via a specially designed video to execute arbitrary code;
   Buffer overflow can be exploited remotely via a specially designed SVG document to execute arbitrary code;
   An improper cairo calls can be exploited remotely via a specially designed video to cause denial of service;
   Lack of restrictions can be exploited remotely via a specially designed API calls to obtain sensitive information;
   An unknown vulnerability can be exploited remotely via a specially designed URL to spoof user interface;
   Buffer overflow can be exploited remotely via a specially designed graphics to execute arbitrary code;
   An unknown vulnerability at Updater can be exploited locally via vectors related to callback application-path parameter and a hard link to write arbitrary files;
   Use-after-free vulnerability can be exploited via vectors related to keyboard yo cause denial of service or execute arbitrary code;
   Use-after-free vulnerability can be exploited via a specially designed JavaScript to execute arbitrary code;
   Use-after-free at WebRTC can be exploited remotely to execute arbitrary code;
   Use-after-free vulnerability can be exploited remotely via a specially designed script to execute arbitrary code;
   An improper input types handling at Sessions Manager can be exploited via session restoration file reading to obtain sensitive information;
   Integer overflow at WebSocket can be exploited remotely via a specially designed packets to cause denial of service or execute arbitrary code;
   Lack of restrictions can be exploited via a specially designed web-site to conduct cross-site scripting;
   An improper rendering display transformation handling can be exploited remotely via a specially designed web site to execute arbitrary code;
   Use-after-free vulnerability can be exploited remotely via a specially designed SVG element to cause denial of service or execute arbitrary code;
   An unknown vulnerability can be exploited user-assisted remote attackers via a files manipulation to bypass security restrictions, conduct universal cross-site scripting attack or read arbitrary files;
   Lack of drag-n-drop restrictions can be exploited via a specially designed web site to access local files;
   An unknown vulnerability can be exploited remotely via a special characters to spoof user interface;
   An improper flags handling can be exploited via a specially designed URL to spoof user interface.
Kaspersky brought up this vulnerability in Firefox, and it contains 22 vulnerabilities! Are we fixing them? An improper network connection handling can be exploited remotely via traffic overview to obtain sensitive information; Multiple unknown vulnerabilities at the browser engine can be exploited remotely to cause denial of service or possibly execute arbitrary code; Buffer overflow vulnerability at ClearKey Content Decryption Module can be exploited remotely via a specially designed video to execute arbitrary code; Buffer overflow can be exploited remotely via a specially designed SVG document to execute arbitrary code; An improper cairo calls can be exploited remotely via a specially designed video to cause denial of service; Lack of restrictions can be exploited remotely via a specially designed API calls to obtain sensitive information; An unknown vulnerability can be exploited remotely via a specially designed URL to spoof user interface; Buffer overflow can be exploited remotely via a specially designed graphics to execute arbitrary code; An unknown vulnerability at Updater can be exploited locally via vectors related to callback application-path parameter and a hard link to write arbitrary files; Use-after-free vulnerability can be exploited via vectors related to keyboard yo cause denial of service or execute arbitrary code; Use-after-free vulnerability can be exploited via a specially designed JavaScript to execute arbitrary code; Use-after-free at WebRTC can be exploited remotely to execute arbitrary code; Use-after-free vulnerability can be exploited remotely via a specially designed script to execute arbitrary code; An improper input types handling at Sessions Manager can be exploited via session restoration file reading to obtain sensitive information; Integer overflow at WebSocket can be exploited remotely via a specially designed packets to cause denial of service or execute arbitrary code; Lack of restrictions can be exploited via a specially designed web-site to conduct cross-site scripting; An improper rendering display transformation handling can be exploited remotely via a specially designed web site to execute arbitrary code; Use-after-free vulnerability can be exploited remotely via a specially designed SVG element to cause denial of service or execute arbitrary code; An unknown vulnerability can be exploited user-assisted remote attackers via a files manipulation to bypass security restrictions, conduct universal cross-site scripting attack or read arbitrary files; Lack of drag-n-drop restrictions can be exploited via a specially designed web site to access local files; An unknown vulnerability can be exploited remotely via a special characters to spoof user interface; An improper flags handling can be exploited via a specially designed URL to spoof user interface.

გადაწყვეტა შერჩეულია

from https://threats.kaspersky.com/en/vulnerability/KLA10852/

Affected products Firefox versions earlier than 48.0 Firefox ESR versions earlier than 45.3.0

You appear to have the older Firefox 47.0 or 47.0.1

https://www.mozilla.org/firefox/releases/ https://www.mozilla.org/security/known-vulnerabilities/firefox/

პასუხის ნახვა სრულად 👍 0

ყველა პასუხი (2)

შერჩეული გადაწყვეტა

from https://threats.kaspersky.com/en/vulnerability/KLA10852/

Affected products Firefox versions earlier than 48.0 Firefox ESR versions earlier than 45.3.0

You appear to have the older Firefox 47.0 or 47.0.1

https://www.mozilla.org/firefox/releases/ https://www.mozilla.org/security/known-vulnerabilities/firefox/

You can try the internal updater: Update Firefox to the latest release.