Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.06%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox < 70, Thun...

  • EPSS 1.52%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.

  • EPSS 0.44%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanism...

  • EPSS 0.38%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox < 70, Thunderbird < 68.2, a...

  • EPSS 1.21%
  • Veröffentlicht 08.01.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:44

Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain...

  • EPSS 0.41%
  • Veröffentlicht 27.09.2019 18:15:14
  • Zuletzt bearbeitet 21.11.2024 04:21:43

A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripp...

  • EPSS 0.89%
  • Veröffentlicht 27.09.2019 18:15:13
  • Zuletzt bearbeitet 25.11.2025 17:50:16

It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60....

Exploit
  • EPSS 0.99%
  • Veröffentlicht 27.09.2019 18:15:12
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cro...

  • EPSS 0.79%
  • Veröffentlicht 27.09.2019 18:15:12
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will b...

  • EPSS 0.65%
  • Veröffentlicht 27.09.2019 18:15:12
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Fire...