Mozilla has published three security advisories (MFSA 2019-25, MFSA 2019-26 and MFSA 2019-27) to address multiple browser vulnerabilities. A remote attacker could entice a user running a vulnerable browser to open a web page with specially crafted content to exploit the vulnerabilities.
Successful exploitation of the vulnerabilities could lead to arbitrary code execution, security restriction bypass, information disclosure, data tampering, privilege escalation, cross-site scripting, memory corruption or application crash on an affected system.
Mozilla has released new versions of the product to address the issues and they can be downloaded at the following URLs:
Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-26/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-27/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11734 (to CVE-2019-11738)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740 (to CVE-2019-11744)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746 (to CVE-2019-11753)