Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in iframe can be exploited remotely to spoof user interface.
- Security bypass vulnerability in OpenPGP can be exploited to bypass security restrictions.
- Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
- Use after free vulnerability in VR Process can be exploited to cause denial of service or execute arbitrary code.
- Use after free in NSSToken vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Denial of service vulnerability in complex regular expressions can be exploited to cause denial of service.
- Use after free vulnerability in DocumentL10n::TranslateDocument can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory write vulnerability in WebAuthN Extensions can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2022-28285 high
- CVE-2022-28289 critical
- CVE-2022-28282 high
- CVE-2022-1097 high
- CVE-2022-24713 critical
- CVE-2022-28286 high
- CVE-2022-28281 critical
- CVE-2022-1196 high
- CVE-2022-1197 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!