説明
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in iframe can be exploited remotely to spoof user interface.
- Security bypass vulnerability in OpenPGP can be exploited to bypass security restrictions.
- Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
- Use after free vulnerability in VR Process can be exploited to cause denial of service or execute arbitrary code.
- Use after free in NSSToken vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Denial of service vulnerability in complex regular expressions can be exploited to cause denial of service.
- Use after free vulnerability in DocumentL10n::TranslateDocument can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory write vulnerability in WebAuthN Extensions can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
関連製品
CVEリスト
- CVE-2022-28285 high
- CVE-2022-28289 critical
- CVE-2022-28282 high
- CVE-2022-1097 high
- CVE-2022-24713 critical
- CVE-2022-28286 high
- CVE-2022-28281 critical
- CVE-2022-1196 high
- CVE-2022-1197 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!