説明
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, bypass security restrictions, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability can be exploited to execute arbitrary code.
- Information disclosure vulnerability in OCSP requests can be exploited to obtain sensitive information.
- Use after free vulnerability in nsSHistory can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability can be exploited to bypass security restrictions.
- Denial of service vulnerability can be exploited to cause denial of service.
- An elevation of privilege vulnerability can be exploited remotely to gain privileges.
- A remote code execution vulnerability can be exploited remotely to execute arbitrary code.
- Integer underflow vulnerability in ReplaceElementsAt can be exploited to cause denial of service.
- Security UI vulnerability in cursor can be exploited to spoof user interface.
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
関連製品
CVEリスト
- CVE-2022-31744 high
- CVE-2022-34472 warning
- CVE-2022-34470 critical
- CVE-2022-34468 critical
- CVE-2022-34478 high
- CVE-2022-2226 high
- CVE-2022-2200 critical
- CVE-2022-34481 critical
- CVE-2022-34484 critical
- CVE-2022-34479 high
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!