Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit some of these vulnerabilities to cross-site scripting, sensitive information disclosure, spoofing, denial of service and remote code execution on the targeted system.
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for remote code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Details of some of the severe vulnerabilities are as follows:
Before installation of the software, please visit the software vendor web-site for more details.
Apply fixes issued by the vendor:
The information provided herein is on an “as is” basis, without warranty of any kind.