Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 19.72%
  • Veröffentlicht 26.04.2019 17:29:01
  • Zuletzt bearbeitet 25.11.2025 17:50:16

The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitab...

  • EPSS 0.31%
  • Veröffentlicht 26.04.2019 17:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for whi...

  • EPSS 0.28%
  • Veröffentlicht 26.04.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:04

A flaw during verification of certain S/MIME signatures causes emails to be shown in Thunderbird as having a valid digital signature, even if the shown message contents aren't covered by the signature. The flaw allows an attacker to reuse a valid S/M...

  • EPSS 0.44%
  • Veröffentlicht 26.04.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:04

A use-after-free vulnerability can occur while playing a sound notification in Thunderbird. The memory storing the sound data is immediately freed, although the sound is still being played asynchronously, leading to a potentially exploitable crash. T...

  • EPSS 0.4%
  • Veröffentlicht 26.04.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:05

A crash can occur when processing a crafted S/MIME message or an XPI package containing a crafted signature. This can be used as a denial-of-service (DOS) attack because Thunderbird reopens the last seen message on restart, triggering the crash again...

  • EPSS 10.44%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to r...

  • EPSS 34.18%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firef...

  • EPSS 26.12%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability...

  • EPSS 1.09%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow fo...

  • EPSS 7.97%
  • Veröffentlicht 28.02.2019 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:56:03

A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird ...