Back

Critical Vulnerabilities Discovered in Mozilla Products

Severity: High (Score: 61.5)

Sources: Hkcert, Cisecurity

Summary

Multiple vulnerabilities have been identified in Mozilla products, with the most severe allowing for arbitrary code execution. Exploitation could enable attackers to install programs, access, modify, or delete data, and create new accounts with full user rights. Users with administrative privileges are at greater risk compared to those with limited rights. The vulnerabilities include a remote code execution vector and a denial of service condition. As of now, there are no reports of these vulnerabilities being exploited in the wild. Users are advised to apply the fixes issued by Mozilla to mitigate risks. The vulnerabilities are categorized under Initial Access tactics and Drive-by Compromise techniques. Specific CVEs have not been disclosed in the articles. Key Points: • Severe vulnerabilities in Mozilla products could lead to arbitrary code execution. • Attackers may exploit these vulnerabilities to gain full user rights on affected systems. • No known exploitation has been reported, but users are urged to apply patches.

Key Entities

  • DDoS (attack_type)
  • T1189 - Drive-by Compromise (mitre_attack)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed