Kaspersky ID:
KLA12522
Erkennungsdatum:
05/03/2022
Aktualisiert:
01/28/2026

Beschreibung

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, obtain sensitive information, bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Fullscreen notification bypass using popups can be exploited to spoof user interface.
  2. Leaking browser history with CSS variables can be exploited to obtain sensitive information.
  3. Security vulnerability in email can be exploited to bypass security restrictions.
  4. An elevation of privilege vulnerability in iframe Sandbox can be exploited remotely to gain privileges.
  5. Improper input validation in Speech Synthesis feature can be exploited to cause denial of service.
  6. Memory safety vulnerability can be exploited to execute arbitrary code.
  7. Security vulnerability in reader mode can be exploited to bypass security restrictions.
  8. Bypassing permission prompt in nested browsing contexts can be exploited to bypass security restrictions.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Betroffene Produkte

CVE Liste

  • CVE-2022-29917
    critical
  • CVE-2022-29911
    high
  • CVE-2022-29909
    critical
  • CVE-2022-29914
    high
  • CVE-2022-29912
    high
  • CVE-2022-29916
    high
  • CVE-2022-1520
    warning
  • CVE-2022-29913
    high

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.