

Depending on the privileges associated with the user an attacker could then install programs view, change, or delete data or create new accounts with full user rights. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution.

Browser window spoof using fullscreen mode (CVE-2022-22743).Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742).Browser window spoof using fullscreen mode (CVE-2022-22741).Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740).Missing throttling on external protocol launch dialog (CVE-2022-22739).Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738).Race condition when playing audio files (CVE-2022-22737).Potential local privilege escalation when loading modules from the install directory.Iframe sandbox bypass with XSLT (CVE-2021-4140).Details of these vulnerabilities are as follows: Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR), and Thunderbird, the most severe of which could allow for arbitrary code execution.
