Latest mozilla thunderbird Vulnerabilities

A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Fire...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 3 more
When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox E...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 3 more
A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 3 more
If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulner...
Mozilla Firefox ESR<115.8
Mozilla Firefox<123
Mozilla Thunderbird<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 3 more
Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.8
Mozilla Firefox<123
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 3 more
Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, the...
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 3 more
Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). This vulnerability affects Firefox ...
ubuntu/firefox<123.0+
Mozilla Firefox<123
Mozilla Thunderbird<115.8
Mozilla Firefox ESR<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
and 3 more
Security Vulnerabilities fixed in Thunderbird 115.8
Mozilla Thunderbird<115.8
Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123...
Mozilla Firefox ESR<115.8
Mozilla Firefox<123
Mozilla Thunderbird<115.8
redhat/firefox<115.8
redhat/thunderbird<115.8
ubuntu/firefox<123.0+
and 3 more
A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox < 122 and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
Mozilla Firefox ESR<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
Mozilla Firefox<122
Mozilla Firefox<122.0
and 8 more
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox < 12...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
Security Vulnerabilities fixed in Thunderbird 115.7
Mozilla Thunderbird<115.7
A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderb...
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
A malicious devtools extension could have been used to escalate privileges.
Mozilla Thunderbird<115.7
redhat/firefox<115.7
redhat/thunderbird<115.7
ubuntu/firefox<122.0+
ubuntu/thunderbird<115.7
Mozilla Firefox ESR<115.7
and 8 more
Security Vulnerabilities fixed in Thunderbird 115.6
Mozilla Thunderbird<115.6
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thund...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
ubuntu/firefox<121.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
and 12 more
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
ubuntu/firefox<121.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
and 13 more
Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
ubuntu/firefox<121.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
and 13 more
A use-after-free was identified in the `nsDNSService::Init`. This issue appears to manifest rarely during start-up. External Reference: <a href="https://www.mozilla.org/en-US/security/advisories/mfs...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
and 9 more
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the messa...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0-1
and 6 more
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux,...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
Mozilla Firefox<121
redhat/firefox<115.6
redhat/thunderbird<115.6
ubuntu/firefox<121.0+
and 16 more
The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
ubuntu/firefox<121.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
and 13 more
The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and...
Mozilla Thunderbird<115.6
Mozilla Firefox ESR<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
ubuntu/firefox<121.0+
ubuntu/thunderbird<1:115.6.0+
and 13 more
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
ubuntu/firefox<121.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
ubuntu/thunderbird<1:115.6.0+
and 13 more
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the ...
Mozilla Thunderbird<115.6
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Mozilla Thunderbird<115.6
ubuntu/thunderbird<1:115.6.0-1
ubuntu/thunderbird<1:115.6.0+
and 6 more
The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115...
Mozilla Firefox ESR<115.6
Mozilla Thunderbird<115.6
redhat/firefox<115.6
redhat/thunderbird<115.6
ubuntu/firefox<121.0+
ubuntu/thunderbird<1:115.6.0+
and 13 more
On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability aff...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects Firefox < 120, Firefox ESR < 115...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
Security Vulnerabilities fixed in Thunderbird 115.5
Mozilla Thunderbird<115.5
Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard. *This bug only affects Firefox on X11...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click ...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems...
redhat/firefox<115.5
redhat/thunderbird<115.5
ubuntu/firefox<120.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
ubuntu/thunderbird<1:115.5.0+
and 13 more
The executable file warning was not presented when downloading .msix, .msixbundle, .appx, and .appxbundle files, which can run commands on a user's computer. *Note: This issue only affected Windows ...
Mozilla Firefox ESR<115.4
Mozilla Thunderbird<115.4.1
Mozilla Firefox<119
Mozilla Firefox<119.0
Mozilla Firefox ESR<115.4
Mozilla Thunderbird<115.4.1
and 1 more
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox < 119, Fire...
Mozilla Thunderbird<115.4.1
Mozilla Firefox ESR<115.4
ubuntu/firefox<119.0+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
and 12 more
A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox < 119, Firefox ES...
Mozilla Thunderbird<115.4.1
Mozilla Firefox ESR<115.4
ubuntu/firefox<119.0+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
and 12 more
Security Vulnerabilities fixed in Thunderbird 115.4.1
<115.4.1
A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks. *Note: This issue only affected macOS op...
Mozilla Firefox ESR<115.4
Mozilla Thunderbird<115.4.1
Mozilla Firefox<119
Mozilla Firefox<119.0
Mozilla Firefox ESR<115.4
Mozilla Thunderbird<115.4.1
and 1 more
Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could ...
Mozilla Thunderbird<115.4.1
Mozilla Firefox ESR<115.4
ubuntu/firefox<119.0+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
and 12 more
During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 119, Firefox ESR ...
Mozilla Thunderbird<115.4.1
Mozilla Firefox ESR<115.4
ubuntu/firefox<119.0+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
and 12 more
Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < ...
Mozilla Firefox ESR<115.4
Mozilla Thunderbird<115.4.1
ubuntu/firefox<119.0+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
ubuntu/thunderbird<1:115.4.1+
and 12 more
Security Vulnerability fixed in Firefox 118.0.1, Firefox ESR 115.3.1, Firefox for Android 118.1.0, Firefox Focus for Android 118.1.0, and Thunderbird 115.3.1.
Mozilla Firefox<118.0.1
Mozilla Firefox ESR<115.3.1
Mozilla Firefox Focus=118.1
Google Android
Mozilla Firefox=118.1
Google Android
and 1 more
Security Vulnerabilities fixed in Thunderbird 115.3
<115.3
If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. *This...
<118
<115.3
<115.3
Mozilla Firefox<118
Mozilla Firefox ESR<115.3
Mozilla Thunderbird<115.3
and 1 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203