Descripción
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, perform cross-site scripting attack, bypass security restrictions, spoof user interface, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Memory corruption vulnerability in NSS can be exploited to execute arbitrary code.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Memory corruption vulnerability in thread creation can be exploited to execute arbitrary code.
- An elevation of privilege vulnerability in permission assignment can be exploited remotely to gain privileges.
- Denial of service vulnerability can be exploited remotely to cause denial of service.
- Cross-site scripting (XSS) vulnerability can be exploited to perform cross-site scripting attack.
- Security vulnerability area can be exploited to bypass security restrictions.
- Security vulnerability can be exploited to bypass security restrictions.
- Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
- Type confusion vulnerability in the ECMA-262 specification relating to Async Generators can be exploited to cause denial of service.
Notas informativas originales
Explotación
Public exploits exist for this vulnerability.
Productos relacionados
Lista CVE
- CVE-2024-6602 critical
- CVE-2024-6604 critical
- CVE-2024-6603 high
- CVE-2024-6601 warning
- CVE-2024-6600 high
- CVE-2024-6614 warning
- CVE-2024-6612 high
- CVE-2024-6607 critical
- CVE-2024-6610 warning
- CVE-2024-6608 warning
- CVE-2024-6609 critical
- CVE-2024-6615 critical
- CVE-2024-6611 critical
- CVE-2024-6613 high
- CVE-2024-6606 critical
- CVE-2024-7652 critical
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!