Mozilla

Thunderbird

1713 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 04.02.2025 14:15:32
  • Zuletzt bearbeitet 13.04.2026 15:16:51

The z-order of the browser windows could be manipulated to hide the fullscreen notification. This could potentially be leveraged to perform a spoofing attack. This vulnerability was fixed in Firefox 135 and Thunderbird 135.

  • EPSS 0.59%
  • Veröffentlicht 04.02.2025 14:15:32
  • Zuletzt bearbeitet 13.04.2026 15:16:51

Memory safety bugs present in Firefox 134 and Thunderbird 134. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed ...

  • EPSS 0.56%
  • Veröffentlicht 04.02.2025 14:15:31
  • Zuletzt bearbeitet 13.04.2026 15:16:35

Thunderbird displayed an incorrect sender address if the From field of an email used the invalid group name syntax that is described in CVE-2024-49040. This vulnerability was fixed in Thunderbird 128.7 and Thunderbird 135.

  • EPSS 0.8%
  • Veröffentlicht 04.02.2025 14:15:31
  • Zuletzt bearbeitet 13.04.2026 15:16:47

An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.

  • EPSS 0.34%
  • Veröffentlicht 04.02.2025 14:15:31
  • Zuletzt bearbeitet 13.04.2026 15:16:49

An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.

  • EPSS 0.21%
  • Veröffentlicht 04.02.2025 14:15:31
  • Zuletzt bearbeitet 13.04.2026 15:16:49

A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird ...

  • EPSS 15.06%
  • Veröffentlicht 07.01.2025 16:15:39
  • Zuletzt bearbeitet 13.04.2026 15:16:35

Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed ...

  • EPSS 0.12%
  • Veröffentlicht 07.01.2025 16:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:32

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability was fixed i...

  • EPSS 0.12%
  • Veröffentlicht 07.01.2025 16:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:32

Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Firefox ESR 115.19, Thunderbird 134, and Thund...

  • EPSS 0.03%
  • Veröffentlicht 07.01.2025 16:15:38
  • Zuletzt bearbeitet 13.04.2026 15:16:32

When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.