Mozilla

Thunderbird

1660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.38%
  • Veröffentlicht 23.07.2019 14:15:14
  • Zuletzt bearbeitet 25.11.2025 17:50:16

If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the co...

Exploit
  • EPSS 8.3%
  • Veröffentlicht 23.07.2019 14:15:14
  • Zuletzt bearbeitet 21.11.2024 04:21:37

A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7.1.

  • EPSS 0.52%
  • Veröffentlicht 23.07.2019 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:36

A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbir...

  • EPSS 0.52%
  • Veröffentlicht 23.07.2019 14:15:13
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7.

Exploit
  • EPSS 69.87%
  • Veröffentlicht 26.04.2019 17:29:04
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.

  • EPSS 46.68%
  • Veröffentlicht 26.04.2019 17:29:04
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox < 66.0.1, Firefox ESR < 60.6.1, and Thunderbird < 60.6.1.

  • EPSS 0.44%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command l...

  • EPSS 0.74%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:19

A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Fir...

  • EPSS 0.74%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controll...

  • EPSS 0.38%
  • Veröffentlicht 26.04.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:52:20

Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself...