Описание
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, execute arbitrary code, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Security UI vulnerability in select option of fullscreen notification dialog can be exploited to spoof user interface.
- Out of bounds memory access vulnerability in graphics shared memory handling can be exploited to cause denial of service.
- Type confusion vulnerability in WebAssembly can be exploited to execute arbitrary code.
- Use after free vulnerability in incomplete WebAssembly exception handing can be exploited to cause denial of service or execute arbitrary code.
- Out of bounds read vulnerability in editor component can be exploited to cause denial of service.
- Security vulnerability in web extension with StreamFilter can be exploited to obtain sensitive information, cause denial of service or execute arbitrary code.
- Uninitialized memory vulnerability in ANGLE used by WebGL can be exploited to obtain sensitive information.
- Use after free vulnerability in JavaScript garbage collection can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in IndexedDB can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in the date picker can be exploited to spoof user interface and bypass security restrictions.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2024-7529 high
- CVE-2024-7518 high
- CVE-2024-7519 critical
- CVE-2024-7521 critical
- CVE-2024-7525 critical
- CVE-2024-7528 critical
- CVE-2024-7522 critical
- CVE-2024-7520 critical
- CVE-2024-7526 high
- CVE-2024-7527 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!