Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, perform cross-site scripting attack, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in networking can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in JavaScript object transplant can be exploited to cause denial of service or execute arbitrary code.
- Сorrupt memory leading vulnerability in Text Fragments can be exploited to a potentially exploitable crash.
- Heap buffer overflow vulnerability can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass security restrictions.
- Security vulnerability when using the ‘Save As’ functionality can be exploited to bypass security restrictions.
- Information disclosure vulnerability can be exploited to obtain sensitive information.
- Information disclosure vulnerability in Offscreen Canvas can be exploited to obtain sensitive information.
Original advisories
Related products
CVE list
- CVE-2024-5692 warning
- CVE-2024-5702 warning
- CVE-2024-5688 warning
- CVE-2024-5700 warning
- CVE-2024-5693 warning
- CVE-2024-5690 warning
- CVE-2024-5691 warning
- CVE-2024-5696 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!