Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, perform cross-site scripting attack, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in networking can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in JavaScript object transplant can be exploited to cause denial of service or execute arbitrary code.
- Сorrupt memory leading vulnerability in Text Fragments can be exploited to a potentially exploitable crash.
- Heap buffer overflow vulnerability can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass security restrictions.
- Security vulnerability when using the ‘Save As’ functionality can be exploited to bypass security restrictions.
- Information disclosure vulnerability can be exploited to obtain sensitive information.
- Information disclosure vulnerability in Offscreen Canvas can be exploited to obtain sensitive information.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2024-5692 high
- CVE-2024-5702 critical
- CVE-2024-5688 critical
- CVE-2024-5700 high
- CVE-2024-5693 high
- CVE-2024-5690 warning
- CVE-2024-5691 warning
- CVE-2024-5696 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!