Описание
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, cause denial of service, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in iframe can be exploited remotely to spoof user interface.
- Security bypass vulnerability in OpenPGP can be exploited to bypass security restrictions.
- Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
- Use after free vulnerability in VR Process can be exploited to cause denial of service or execute arbitrary code.
- Use after free in NSSToken vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Denial of service vulnerability in complex regular expressions can be exploited to cause denial of service.
- Use after free vulnerability in DocumentL10n::TranslateDocument can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds memory write vulnerability in WebAuthN Extensions can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2022-28285 high
- CVE-2022-28289 critical
- CVE-2022-28282 high
- CVE-2022-1097 high
- CVE-2022-24713 critical
- CVE-2022-28286 high
- CVE-2022-28281 critical
- CVE-2022-1196 high
- CVE-2022-1197 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!