Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- Overriding file type vulnerability can be exploited to bypass security restrictions and obtain sensitive information.
- Security vulnerability can be exploited to bypass security restrictions.
- Security vulnerability can be exploited to obtain sensitive information and bypass security restrictions.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Type confusion vulnerability can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass same origin policy.
- Implementation vulnerability in WebRTC can be exploited to potentially denial of service.
- DLL hijacking vulnerability on Windows can be exploited to bypass security restrictions.
- Security UI vulnerabiloty in CSS can be exploited to spoof user interface.
- Use after free vulnerability in ANGLE component can be exploited to potentially cause denial of service.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2020-6463 critical
- CVE-2020-6514 high
- CVE-2020-15658 high
- CVE-2020-15653 high
- CVE-2020-15652 high
- CVE-2020-15655 high
- CVE-2020-15656 critical
- CVE-2020-15659 critical
- CVE-2020-15657 critical
- CVE-2020-15654 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!