Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.42%
  • Veröffentlicht 09.07.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:41

When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird...

  • EPSS 0.26%
  • Veröffentlicht 09.07.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:38

If Thunderbird is configured to use STARTTLS for an IMAP server, and the server sends a PREAUTH response, then Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection. This vulnerability affects Thun...

  • EPSS 0.1%
  • Veröffentlicht 09.07.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:38

NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.

Exploit
  • EPSS 0.66%
  • Veröffentlicht 09.07.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:39

When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.

Exploit
  • EPSS 0.5%
  • Veröffentlicht 09.07.2020 14:15:10
  • Zuletzt bearbeitet 25.11.2025 17:50:16

An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerabili...

  • EPSS 0.14%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:37

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resul...

  • EPSS 6.27%
  • Veröffentlicht 26.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:15

A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

  • EPSS 1%
  • Veröffentlicht 26.05.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:37

A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

  • EPSS 0.48%
  • Veröffentlicht 26.05.2020 17:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:37

The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted...

  • EPSS 1.47%
  • Veröffentlicht 26.05.2020 17:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:38

Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to...