Kaspersky ID:
KLA12574
Fecha de detección:
06/28/2022
Actualizado:
01/28/2026

Descripción

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, bypass security restrictions, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability can be exploited to execute arbitrary code.
  2. Information disclosure vulnerability in OCSP requests can be exploited to obtain sensitive information.
  3. Use after free vulnerability in nsSHistory can be exploited to cause denial of service or execute arbitrary code.
  4. Security vulnerability can be exploited to bypass security restrictions.
  5. Denial of service vulnerability can be exploited to cause denial of service.
  6. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  7. A remote code execution vulnerability can be exploited remotely to execute arbitrary code.
  8. Integer underflow vulnerability in ReplaceElementsAt can be exploited to cause denial of service.
  9. Security UI vulnerability in cursor can be exploited to spoof user interface.

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Productos relacionados

Lista CVE

  • CVE-2022-31744
    high
  • CVE-2022-34472
    warning
  • CVE-2022-34470
    critical
  • CVE-2022-34468
    critical
  • CVE-2022-34478
    high
  • CVE-2022-2226
    high
  • CVE-2022-2200
    critical
  • CVE-2022-34481
    critical
  • CVE-2022-34484
    critical
  • CVE-2022-34479
    high

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.