Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Veröffentlicht 09.07.2024 15:15:12
  • Zuletzt bearbeitet 04.04.2025 14:42:46

Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This ...

  • EPSS 0.19%
  • Veröffentlicht 09.07.2024 15:15:12
  • Zuletzt bearbeitet 04.04.2025 14:42:31

Clipboard code failed to check the index on an array access. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 128 and Thunderbird < 128.

Exploit
  • EPSS 0.93%
  • Veröffentlicht 09.07.2024 15:15:12
  • Zuletzt bearbeitet 16.07.2025 15:40:03

It was possible to prevent a user from exiting pointerlock when pressing escape and to overlay customValidity notifications from a `<select>` element over certain permission prompts. This could be used to confuse a user into giving a site unint...

  • EPSS 0.12%
  • Veröffentlicht 09.07.2024 15:15:12
  • Zuletzt bearbeitet 25.03.2025 17:16:12

It was possible to move the cursor using pointerlock from an iframe. This allowed moving the cursor outside of the viewport and the Firefox window. This vulnerability affects Firefox < 128 and Thunderbird < 128.

  • EPSS 0.62%
  • Veröffentlicht 09.07.2024 15:15:12
  • Zuletzt bearbeitet 03.11.2025 23:17:31

When almost out-of-memory an elliptic curve key which was never allocated could have been freed again. This vulnerability affects Firefox < 128 and Thunderbird < 128.

  • EPSS 0.09%
  • Veröffentlicht 09.07.2024 15:15:12
  • Zuletzt bearbeitet 18.03.2025 21:15:32

Form validation popups could capture escape key presses. Therefore, spamming form validation messages could be used to prevent users from exiting full-screen mode. This vulnerability affects Firefox < 128 and Thunderbird < 128.

  • EPSS 2.24%
  • Veröffentlicht 11.06.2024 13:15:51
  • Zuletzt bearbeitet 06.11.2025 22:25:36

By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

  • EPSS 0.18%
  • Veröffentlicht 11.06.2024 13:15:51
  • Zuletzt bearbeitet 04.04.2025 14:41:15

Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This ...

  • EPSS 0.74%
  • Veröffentlicht 11.06.2024 13:15:51
  • Zuletzt bearbeitet 04.04.2025 14:41:47

Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12.

Exploit
  • EPSS 0.92%
  • Veröffentlicht 11.06.2024 13:15:50
  • Zuletzt bearbeitet 04.04.2025 23:46:14

If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.