Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, perform cross-site scripting attack, bypass security restrictions, spoof user interface, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Memory corruption vulnerability in NSS can be exploited to execute arbitrary code.
 - Memory safety vulnerability can be exploited to execute arbitrary code.
 - Memory corruption vulnerability in thread creation can be exploited to execute arbitrary code.
 - An elevation of privilege vulnerability in permission assignment can be exploited remotely to gain privileges.
 - Denial of service vulnerability can be exploited remotely to cause denial of service.
 - Cross-site scripting (XSS) vulnerability can be exploited to perform cross-site scripting attack.
 - Security vulnerability area can be exploited to bypass security restrictions.
 - Security vulnerability can be exploited to bypass security restrictions.
 - Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
 - Type confusion vulnerability in the ECMA-262 specification relating to Async Generators can be exploited to cause denial of service.
 
Original advisories
Related products
CVE list
- CVE-2024-6602 critical
 - CVE-2024-6604 critical
 - CVE-2024-6603 high
 - CVE-2024-6601 warning
 - CVE-2024-6600 high
 - CVE-2024-6614 warning
 - CVE-2024-6612 high
 - CVE-2024-6607 critical
 - CVE-2024-6610 warning
 - CVE-2024-6608 warning
 - CVE-2024-6609 critical
 - CVE-2024-6615 critical
 - CVE-2024-6611 critical
 - CVE-2024-6613 high
 - CVE-2024-6606 critical
 - CVE-2024-7652 critical
 
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
                                    Found an inaccuracy in the description of this vulnerability? Let us know!