Mozilla

Thunderbird

1567 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.74%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 21.11.2024 03:27:35

If a malicious site uses the "view-source:" protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hyperlink is selected. This was fixed by no longer making "view-source:" linkable. This vulnerability ...

  • EPSS 0.49%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 21.11.2024 03:27:35

The Gecko Media Plugin sandbox allows access to local files that match specific regular expressions. On OS OX, this matching allows access to some data in subdirectories of "/private/var" that could expose personal or temporary data. This has been up...

  • EPSS 0.3%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 21.11.2024 03:27:35

On Linux, if the secure computing mode BPF (seccomp-bpf) filter is running when the Gecko Media Plugin sandbox is started, the sandbox fails to be applied and items that would run within the sandbox are run protected only by the running filter which ...

  • EPSS 1.99%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrar...

  • EPSS 0.79%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulne...

  • EPSS 2.02%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.

Exploit
  • EPSS 2.02%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affect...

Exploit
  • EPSS 2.02%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.

  • EPSS 2.49%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1,...

  • EPSS 1.05%
  • Veröffentlicht 11.06.2018 21:29:05
  • Zuletzt bearbeitet 25.11.2025 17:50:16

An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affec...