Firefox Patches Multiple High Severity Vulnerabilities

by Esmeralda McKenzie
Firefox Patches Multiple High Severity Vulnerabilities

Firefox Patches Multiple High Severity Vulnerabilities

Firefox Patches More than one High Severity Vulnerabilities

Mozilla has released Firefox 129, addressing diverse high-severity vulnerabilities. These patches are extreme for enhancing the browser’s security and maintaining users from skill exploits.

Detailed Vulnerability Table

The most standard Firefox update patches several extreme vulnerabilities, every greatly impacting individual security. Below is a summary of the most important disorders:

Google Recordsdata

CVE ID Impact Description References
CVE-2024-7518 High Out-of-bounds memory win entry to in graphics shared memory handling. Worm 1875354
CVE-2024-7519 High Out of bounds memory win entry to in graphics shared memory handling. Worm 1902307
CVE-2024-7520 The fullscreen notification dialog will also be obscured by yarn teach. Form confusion in WebAssembly. Worm 1903041
CVE-2024-7521 High Incomplete WebAssembly exception handling. Worm 1904644
CVE-2024-7522 High Out of bounds read in editor ingredient. Worm 1906727
CVE-2024-7523 High Doc teach could per chance well partly vague security prompts (affects Android variations). Worm 1908344
CVE-2024-7524 High CSP strict-dynamic bypass the utilization of net-compatibility shims. Worm 1909241
CVE-2024-7525 High Lacking permission test when rising a StreamFilter. Worm 1909298
CVE-2024-7526 High Uninitialized memory venerable by WebGL. Worm 1910306
CVE-2024-7527 High Voice-after-free in JavaScript rubbish collection. Worm 1871303
CVE-2024-7528 High Voice-after-free in IndexedDB. Worm 1895951
CVE-2024-7529 Life like Doc teach could per chance well partly vague security prompts. Worm 1903187
CVE-2024-7530 Life like Voice-after-free in JavaScript code protection collection. Worm 1904011
CVE-2024-7531 Low PK11_Encrypt the utilization of CKM_CHACHA20 can indicate plaintext on Intel Sandy Bridge machines. Worm 1910306

The vulnerabilities addressed in this update pose valuable dangers, collectively with skill spoofing assaults, memory corruption, sandbox escapes, and unauthorized files win entry to.

To illustrate, CVE-2024-7518 could per chance well allow a malicious residing to vague fullscreen notification dialogs, potentially tricking users into performing unintended actions.

Equally, CVE-2024-7519 involves out-of-bounds memory win entry to, which could per chance well consequence in memory corruption and sandbox escapes. Given the high impact of these vulnerabilities, users are strongly told to update their Firefox browsers to model 129 straight.

This update enhances security and ensures a safer browsing expertise by mitigating the hazards related with these vulnerabilities.

Mozilla’s proactive methodology to addressing these disorders underscores the importance of standard utility updates and vigilance in cybersecurity practices. Customers could per chance well fair tranquil remain knowledgeable about such updates and note them promptly to defend their files and privateness.

Source credit : cybersecuritynews.com

Related Posts