説明
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, obtain sensitive information, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- URI vulnerability in WebRTC can be exploited to perform domain spoofing and bypass security restrictions.
- RSA key generation vulnerability can be exploited to bypass security restrictions and obtain sensitive information.
- SB vulnerability in AppCache can be exploited to bypass security restrictions.
- DLL Hijacking vulnerability in webauthn.dll on Windows can be exploited to execute arbitrary code.
- Use after free vulnerability in WebRTC VideoBroadcaster can be exploited to potentially cause denial of service.
- Out of bounds read vulnerability Date.parse() component can be exploited to potentially obtain sensitive information.
- A security bypass vulnerability in X-Frame-Options can be exploited to security bypass restrictions.
- Memory vulnerability in Firefox can be exploited to execute arbitrary code.
- Integer overflow vulnerability in nsJPEGEncoder::emptyOutputBuffer component can be exploited to potentially cause denial of service.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2020-12424 high
- CVE-2020-12425 high
- CVE-2020-12416 critical
- CVE-2020-12426 critical
- CVE-2020-12422 critical
- CVE-2020-12423 critical
- CVE-2020-12415 high
- CVE-2020-12402 warning
- CVE-2020-15648 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!