Mozilla

Thunderbird

1584 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 27.05.2025 12:29:26
  • Zuletzt bearbeitet 03.11.2025 20:19:16

Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbi...

Medienbericht
  • EPSS 0.06%
  • Veröffentlicht 27.05.2025 12:29:21
  • Zuletzt bearbeitet 19.09.2025 17:18:14

A double-free could have occurred in `vpx_codec_enc_init_multi` after a failed allocation when initializing the encoder for WebRTC. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird <...

Medienbericht
  • EPSS 0.06%
  • Veröffentlicht 17.05.2025 21:07:27
  • Zuletzt bearbeitet 03.11.2025 20:19:11

An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. This vulnerability affects Firefox < 138.0.4, Firefox ESR < 128.10.1, Firefox ESR < 115.23.1, Thunderbird < 128.10.2, and Thunderbir...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 17.05.2025 21:07:26
  • Zuletzt bearbeitet 03.11.2025 20:19:11

An attacker was able to perform an out-of-bounds read or write on a JavaScript `Promise` object. This vulnerability affects Firefox < 138.0.4, Firefox ESR < 128.10.1, Firefox ESR < 115.23.1, Thunderbird < 128.10.2, and Thunderbird < 138.0.2.

  • EPSS 0.03%
  • Veröffentlicht 14.05.2025 16:56:43
  • Zuletzt bearbeitet 11.06.2025 13:15:24

Rejected reason: This CVE was marked as fixed, but due to other code landing - was not actually fixed. It was subsequently fixed in CVE-2025-5986.

  • EPSS 0.19%
  • Veröffentlicht 14.05.2025 16:56:43
  • Zuletzt bearbeitet 03.11.2025 20:18:48

Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird...

  • EPSS 0.06%
  • Veröffentlicht 14.05.2025 16:56:43
  • Zuletzt bearbeitet 03.11.2025 20:18:48

It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent that. Thunderbird has...

  • EPSS 0.08%
  • Veröffentlicht 14.05.2025 16:56:42
  • Zuletzt bearbeitet 03.11.2025 20:18:48

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as...

  • EPSS 0.11%
  • Veröffentlicht 29.04.2025 13:13:50
  • Zuletzt bearbeitet 03.11.2025 20:19:10

Memory safety bug present in Firefox ESR 128.9, and Thunderbird 128.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR <...

  • EPSS 0.07%
  • Veröffentlicht 29.04.2025 13:13:49
  • Zuletzt bearbeitet 09.05.2025 19:32:00

Memory safety bugs present in Firefox 137 and Thunderbird 137. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Fi...