説明
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, obtain sensitive information, execute arbitrary code, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
- Memory corruption and vulnerability can be exploited to cause denial of service;
- A security vulnerability can be exploited to bypass security restrictions;
- A race condition vulnerability can be exploited via special crafted object to cause denial of service or obtain sensitive information;
- A integer overflow vulnerability can be exploited to security bypass restrictions;
- A Null read vulnerability related to WebAssembly JIT can be exploited to cause denial of service;
- A vulnerability related to FTP URL can be exploited to execute arbitrary code;
- A vulnerability related to secure lock icon can be exploited to spoof user interface;
- A memory safety vulnerability related to Responsive Design Mode can be exploited to execute arbitrary code;
- Elevation of privilege vulnerability related to Blob URL can be exploited to gain privileges;
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2021-23961 high
- CVE-2021-23994 critical
- CVE-2021-29948 warning
- CVE-2021-29946 critical
- CVE-2021-29945 high
- CVE-2021-24002 critical
- CVE-2021-23998 high
- CVE-2021-23995 critical
- CVE-2021-23999 critical
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!