Описание
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, bypass security restrictions, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Information disclosure vulnerability in Cloud Clipboard for Windows can be exploited to obtain sensitive information.
- Security UI vulnerability can be exploited to spoof user interface or obtain sensitive information.
- Security vulnerability in iframe sandbox rules can be exploited to bypass security restrictions.
- Code execution vulnerability for MacOS can be exploited via special .inetloc files to execute arbitrary code.
- Use after free vulnerability in file picker dialog can be exploited to cause denial of service.
- Security vulnerability can be exploited to bypass security restrictions and spoof user interface.
- Security bypass vulnerability in HTTP2 can be exploited to bypass security restrictions.
- Security UI vulnerability in Javascript alert box can be exploited to spoof user interface.
- Use after free vulnerability in HTTP2 Session object can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Memory corruption vulnerability in S/MIME messages can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2021-38505 warning
- CVE-2021-38506 warning
- CVE-2021-38503 critical
- CVE-2021-38510 high
- CVE-2021-38504 high
- CVE-2021-38508 warning
- CVE-2021-38507 warning
- CVE-2021-38509 warning
- CVE-2021-43535 high
- CVE-2021-43534 high
- CVE-2021-43529 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!