Descripción
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, perform cross-site scripting attack, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in networking can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in JavaScript object transplant can be exploited to cause denial of service or execute arbitrary code.
- Сorrupt memory leading vulnerability in Text Fragments can be exploited to a potentially exploitable crash.
- Heap buffer overflow vulnerability can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass security restrictions.
- Security vulnerability when using the ‘Save As’ functionality can be exploited to bypass security restrictions.
- Information disclosure vulnerability can be exploited to obtain sensitive information.
- Information disclosure vulnerability in Offscreen Canvas can be exploited to obtain sensitive information.
Notas informativas originales
Explotación
Public exploits exist for this vulnerability.
Productos relacionados
Lista CVE
- CVE-2024-5692 high
- CVE-2024-5702 critical
- CVE-2024-5688 critical
- CVE-2024-5700 high
- CVE-2024-5693 high
- CVE-2024-5690 warning
- CVE-2024-5691 warning
- CVE-2024-5696 critical
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!