Mozilla

Thunderbird

1542 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.6%
  • Veröffentlicht 23.07.2019 14:15:14
  • Zuletzt bearbeitet 21.11.2024 04:21:36

The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. ...

  • EPSS 0.4%
  • Veröffentlicht 23.07.2019 14:15:14
  • Zuletzt bearbeitet 21.11.2024 04:21:36

A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at ...

  • EPSS 0.38%
  • Veröffentlicht 23.07.2019 14:15:14
  • Zuletzt bearbeitet 21.11.2024 04:21:36

If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the co...

Exploit
  • EPSS 8.3%
  • Veröffentlicht 23.07.2019 14:15:14
  • Zuletzt bearbeitet 21.11.2024 04:21:37

A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7.1.

  • EPSS 0.52%
  • Veröffentlicht 23.07.2019 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:36

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbir...

  • EPSS 0.52%
  • Veröffentlicht 23.07.2019 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:36

A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

Exploit
  • EPSS 70.88%
  • Veröffentlicht 26.04.2019 17:29:04
  • Zuletzt bearbeitet 21.11.2024 04:52:21

Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.

  • EPSS 51.92%
  • Veröffentlicht 26.04.2019 17:29:04
  • Zuletzt bearbeitet 21.11.2024 04:52:21

Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.

  • EPSS 0.44%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command l...

  • EPSS 0.76%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Fir...