Mozilla

Thunderbird

1660 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.68%
  • Veröffentlicht 11.06.2018 21:29:01
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 50....

Exploit
  • EPSS 0.71%
  • Veröffentlicht 11.06.2018 21:29:01
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.

  • EPSS 1.87%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affect...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnera...

  • EPSS 2.57%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

  • EPSS 1.82%
  • Veröffentlicht 11.06.2018 21:29:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50.

Exploit
  • EPSS 2.85%
  • Veröffentlicht 16.05.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:18:27

The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification ...

Exploit
  • EPSS 0.45%
  • Veröffentlicht 16.05.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:18:27

The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.

Exploit
  • EPSS 1.06%
  • Veröffentlicht 15.03.2017 15:59:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string ar...