説明
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- Overriding file type vulnerability can be exploited to bypass security restrictions and obtain sensitive information.
- Security vulnerability can be exploited to bypass security restrictions.
- Security vulnerability can be exploited to obtain sensitive information and bypass security restrictions.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Type confusion vulnerability can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass same origin policy.
- Implementation vulnerability in WebRTC can be exploited to potentially denial of service.
- DLL hijacking vulnerability on Windows can be exploited to bypass security restrictions.
- Security UI vulnerabiloty in CSS can be exploited to spoof user interface.
- Use after free vulnerability in ANGLE component can be exploited to potentially cause denial of service.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2020-6463 critical
- CVE-2020-6514 high
- CVE-2020-15658 high
- CVE-2020-15653 high
- CVE-2020-15652 high
- CVE-2020-15655 high
- CVE-2020-15656 critical
- CVE-2020-15659 critical
- CVE-2020-15657 critical
- CVE-2020-15654 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!