Описание
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service, spoof user interface.
Below is a complete list of vulnerabilities:
- Overriding file type vulnerability can be exploited to bypass security restrictions and obtain sensitive information.
- Security vulnerability can be exploited to bypass security restrictions.
- Security vulnerability can be exploited to obtain sensitive information and bypass security restrictions.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Type confusion vulnerability can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass same origin policy.
- Implementation vulnerability in WebRTC can be exploited to potentially denial of service.
- DLL hijacking vulnerability on Windows can be exploited to bypass security restrictions.
- Security UI vulnerabiloty in CSS can be exploited to spoof user interface.
- Use after free vulnerability in ANGLE component can be exploited to potentially cause denial of service.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2020-6463 critical
- CVE-2020-6514 high
- CVE-2020-15658 high
- CVE-2020-15653 high
- CVE-2020-15652 high
- CVE-2020-15655 high
- CVE-2020-15656 critical
- CVE-2020-15659 critical
- CVE-2020-15657 critical
- CVE-2020-15654 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!