- Home
- CVEs with nessus.description==Christian Holler, Terrence Cole, Jesse Ruderman, Gary Kwong, Eric
Rescorla, Jonathan Kew, Dan Gohman, Ryan VanderMeulen and Sotaro Ikeda
discovered multiple memory safety issues in Thunderbird. If a user
were tricked in to opening a specially crafted message with scripting
enabled, an attacker could potentially exploit these to cause a denial
of service via application crash, or execute arbitrary code with the
privileges of the user invoking Thunderbird. (CVE-2014-1477)
Cody Crews discovered a method to bypass System Only Wrappers. If a
user had enabled scripting, an attacker could potentially exploit this
to steal confidential data or execute code with the privileges of the
user invoking Thunderbird. (CVE-2014-1479)
Fredrik Lonnqvist discovered a use-after-free in Thunderbird. If a
user had enabled scripting, an attacker could potentially exploit this
to cause a denial of service via application crash, or execute
arbitrary code with the priviliges of the user invoking Thunderbird.
(CVE-2014-1482)
Arthur Gerkis discovered a use-after-free in Thunderbird. If a user
had enabled scripting, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary
code with the priviliges of the user invoking Thunderbird.
(CVE-2014-1486)
Masato Kinugawa discovered a cross-origin information leak in web
worker error messages. If a user had enabled scripting, an attacker
could potentially exploit this to steal confidential information.
(CVE-2014-1487)
Several issues were discovered with ticket handling in NSS. An
attacker could potentially exploit these to cause a denial of service
or bypass cryptographic protection mechanisms. (CVE-2014-1490,
CVE-2014-1491)
Boris Zbarsky discovered that security restrictions on window objects
could be bypassed under certain circumstances. (CVE-2014-1481)
Fabian Cuchietti and Ateeq ur Rehman Khan discovered that it was
possible to bypass JavaScript execution restrictions when replying to
or forwarding mail messages in certain circumstances. An attacker
could potentially exploit this to steal confidential information or
modify message content. (CVE-2013-6674).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top