Kaspersky ID:
KLA74632
Detekováno:
10/29/2024
Aktualizováno:
10/31/2024

Popis

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, cause denial of service, perform cross-site scripting attack, gain privileges, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Security UI vulnerability sing a data: URL within an iframe can be exploited to spoof user interface.
  2. Security vulnerability can be exploited to bypass security restrictions.
  3. Denial of service vulnerability can be exploited remotely to cause denial of service.
  4. Security UI vulnerability in cursor can be exploited to spoof user interface.
  5. Cross-site scripting (XSS) vulnerability in multipart/x-mixed-replace response can be exploited to perform cross-site scripting attack.
  6. Security vulnerability in composition area can be exploited to bypass security restrictions.
  7. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  8. Memory safety vulnerability can be exploited to execute arbitrary code.
  9. Use after free vulnerability in layout with accessibility can be exploited to cause denial of service or execute arbitrary code.

Oficiální doporučení

Související produkty

seznam CVE

  • CVE-2024-10460
    warning
  • CVE-2024-10463
    warning
  • CVE-2024-10465
    warning
  • CVE-2024-10466
    warning
  • CVE-2024-10461
    warning
  • CVE-2024-10462
    warning
  • CVE-2024-10458
    warning
  • CVE-2024-10467
    warning
  • CVE-2024-10464
    warning
  • CVE-2024-10459
    warning
  • CVE-2024-10468
    warning

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.