Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.11%
  • Veröffentlicht 22.12.2022 20:15:12
  • Zuletzt bearbeitet 16.04.2025 16:15:20

After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 22.12.2022 20:15:11
  • Zuletzt bearbeitet 16.04.2025 15:15:45

During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.

  • EPSS 0.17%
  • Veröffentlicht 22.12.2022 20:15:11
  • Zuletzt bearbeitet 16.04.2025 16:15:18

When receiving an OpenPGP/MIME signed email message that contains an additional outer MIME message layer, for example a message footer added by a mailing list gateway, Thunderbird only considered the inner signed message for the signature validity. T...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 22.12.2022 20:15:11
  • Zuletzt bearbeitet 16.04.2025 16:15:18

An out of date graphics library (Angle) likely contained vulnerabilities that could potentially be exploited. This vulnerability affects Thunderbird < 78.9 and Firefox ESR < 78.9.

  • EPSS 0.47%
  • Veröffentlicht 08.12.2021 22:15:10
  • Zuletzt bearbeitet 21.11.2024 06:29:24

Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

  • EPSS 0.27%
  • Veröffentlicht 08.12.2021 22:15:10
  • Zuletzt bearbeitet 21.11.2024 06:29:24

It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.

  • EPSS 0.45%
  • Veröffentlicht 08.12.2021 22:15:09
  • Zuletzt bearbeitet 21.11.2024 06:17:16

By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the pe...

  • EPSS 0.54%
  • Veröffentlicht 08.12.2021 22:15:09
  • Zuletzt bearbeitet 21.11.2024 06:17:16

Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox < 94,...

  • EPSS 0.47%
  • Veröffentlicht 08.12.2021 22:15:09
  • Zuletzt bearbeitet 21.11.2024 06:17:16

The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. T...

  • EPSS 0.86%
  • Veröffentlicht 08.12.2021 22:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:21

Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerab...