Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 22.12.2022 20:15:24
  • Zuletzt bearbeitet 16.04.2025 14:15:20

Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.

Exploit
  • EPSS 7.21%
  • Veröffentlicht 22.12.2022 20:15:23
  • Zuletzt bearbeitet 15.04.2025 21:15:46

If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerabi...

Exploit
  • EPSS 5.07%
  • Veröffentlicht 22.12.2022 20:15:23
  • Zuletzt bearbeitet 15.04.2025 20:15:35

By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. Thi...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 22.12.2022 20:15:22
  • Zuletzt bearbeitet 15.04.2025 21:15:45

Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behav...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 22.12.2022 20:15:22
  • Zuletzt bearbeitet 15.04.2025 21:15:46

When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Fire...

Warnung Exploit
  • EPSS 5.7%
  • Veröffentlicht 22.12.2022 20:15:22
  • Zuletzt bearbeitet 04.11.2025 14:35:17

Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3...

Warnung Exploit
  • EPSS 4.33%
  • Veröffentlicht 22.12.2022 20:15:22
  • Zuletzt bearbeitet 04.11.2025 14:35:12

An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox ...

  • EPSS 0.19%
  • Veröffentlicht 22.12.2022 20:15:21
  • Zuletzt bearbeitet 16.04.2025 15:15:51

When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 22.12.2022 20:15:21
  • Zuletzt bearbeitet 16.04.2025 15:15:51

If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. Thi...

  • EPSS 0.17%
  • Veröffentlicht 22.12.2022 20:15:20
  • Zuletzt bearbeitet 16.04.2025 15:15:49

Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 9...