Executive Summary
Summary | |
---|---|
Title | Mozilla Thunderbird: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201908-20 | First vendor Publication | 2019-08-16 |
Vendor | Gentoo | Last vendor Modification | 2019-08-16 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Background Description Impact Workaround Resolution All Mozilla Thunderbird binary users should upgrade to the latest version: References Availability https://security.gentoo.org/glsa/201908-20 |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201908-20.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
36 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
9 % | CWE-416 | Use After Free |
9 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
9 % | CWE-125 | Out-of-bounds Read |
9 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
9 % | CWE-116 | Improper Encoding or Escaping of Output |
9 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
9 % | CWE-74 | Failure to Sanitize Data into a Different Plane ('Injection') |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2019-08-16 21:18:45 |
|