Описание
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, perform cross-site scripting attack, bypass security restrictions, spoof user interface, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Memory corruption vulnerability in NSS can be exploited to execute arbitrary code.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Memory corruption vulnerability in thread creation can be exploited to execute arbitrary code.
- An elevation of privilege vulnerability in permission assignment can be exploited remotely to gain privileges.
- Denial of service vulnerability can be exploited remotely to cause denial of service.
- Cross-site scripting (XSS) vulnerability can be exploited to perform cross-site scripting attack.
- Security vulnerability area can be exploited to bypass security restrictions.
- Security vulnerability can be exploited to bypass security restrictions.
- Out of bounds memory read vulnerability in JIT Codegen Extensions can be exploited to cause denial of service.
- Type confusion vulnerability in the ECMA-262 specification relating to Async Generators can be exploited to cause denial of service.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2024-6602 warning
- CVE-2024-6604 warning
- CVE-2024-6603 warning
- CVE-2024-6601 warning
- CVE-2024-6600 warning
- CVE-2024-6614 warning
- CVE-2024-6612 warning
- CVE-2024-6607 warning
- CVE-2024-6610 warning
- CVE-2024-6608 warning
- CVE-2024-6609 warning
- CVE-2024-6615 warning
- CVE-2024-6611 warning
- CVE-2024-6613 warning
- CVE-2024-6606 warning
- CVE-2024-7652 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!