[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:47873
Mozilla Thunderbird (64 bit) is installed.

oval:org.secpod.oval:def:55480
Mozilla Thunderbird 60.7.1: A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash.

oval:org.secpod.oval:def:55481
Mozilla Thunderbird 60.7.1: A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash.

oval:org.secpod.oval:def:70872
Mozilla Thunderbird before 78.9.1: If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid su ...

oval:org.secpod.oval:def:77807
The host is missing a high severity security update according to the Mozilla advisory MFSA2022-07 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspeci ...

oval:org.secpod.oval:def:77808
Mozilla Thunderbird 91.6.1: Crafted email could trigger an out-of-bounds write. It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message..

oval:org.secpod.oval:def:55483
Mozilla Thunderbird 60.7.1: A flaw in Thunderbird's implementation of iCal causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash.

oval:org.secpod.oval:def:55482
Mozilla Thunderbird 60.7.1: A flaw in Thunderbird's implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash.

oval:org.secpod.oval:def:55479
The host is missing a high security update according to Mozilla advisory, MFSA2019-17. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

oval:org.secpod.oval:def:86237
Mozilla Firefox ESR 102.6, Mozilla Thunderbird 102.6 : A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.

oval:org.secpod.oval:def:70465
The host is missing a high severity security update according to the Mozilla advisory, MFSA2021-12 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified i ...

oval:org.secpod.oval:def:70873
Mozilla Thunderbird before 78.9.1: An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird ...

oval:org.secpod.oval:def:70874
The host is missing a moderate security update according to Mozilla advisory, MFSA2021-13. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle a unknown vector. Successful exploitation could allow an attacker to encrypt email and di ...

oval:org.secpod.oval:def:86230
The host is missing a high severity security update according to the Mozilla advisory MFSA2022-53 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified imp ...

oval:org.secpod.oval:def:74357
The host is missing a high severity security update according to the Mozilla advisory MFSA2021-35 and is prone to multiple vulnerabilities. The flas are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified impa ...

oval:org.secpod.oval:def:74779
The host is missing a high severity security update according to the Mozilla advisory MFSA2021-42 and is prone to multiple vulnerabilities. The flas are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified impa ...

oval:org.secpod.oval:def:74780
The host is missing a high severity security update according to the Mozilla advisory MFSA2021-41 and is prone to multiple vulnerabilities. The flas are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified impa ...

oval:org.secpod.oval:def:74785
Mozilla Firefox ESR 78.14, Mozilla Firefox ESR 91.1, Mozilla Thunderbird 78.14, Mozilla Thunderbird 91.1: Mozilla developers Tyson Smith, Christian Holler, and Gabriele Svelto reported memory safety bugs present in Firefox 91 and Firefox ESR 91.0. Some of these bugs showed evidence of memory corrupt ...

oval:org.secpod.oval:def:77232
The host is missing a high severity security update according to the Mozilla advisory MFSA2022-03 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause unspecified im ...

oval:org.secpod.oval:def:58733
Mozilla Thunderbird 68.1 : Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward.

oval:org.secpod.oval:def:89099
Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash.

oval:org.secpod.oval:def:89119
Mozilla Thunderbird 102.10 : Certain malformed OpenPGP messages could trigger incorrect parsing of PKESK/SKESK packets due to a bug in the Ribose RNP library used by Thunderbird up to version 102.9.1, which would cause the Thunderbird user interface to hang. The issue was discovered using Google's o ...

oval:org.secpod.oval:def:96002
The host is missing a high severity security update according to the Mozilla advisory MFSA2023-55 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle various components. Successful exploitation could lead to a potentially exploitable cra ...

oval:org.secpod.oval:def:95992
Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : A use-after-free was identified in the "nsDNSService::Init". This issue appears to manifest rarely during start-up.

oval:org.secpod.oval:def:98114
Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages. Thunderbird versions 91.3.0 and later will not call the vulnerable code when processing S/MIME messages that contain certificates with DER-encoded DSA or RSA-PSS sign ...

oval:org.secpod.oval:def:93418
The host is missing a high severity security update according to the Mozilla advisory MFSA2023-38 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could lead to a potentially exploitable crash.

oval:org.secpod.oval:def:67826
The host is missing a critical security update according to Mozilla advisory, MFSA2020-54. The update is required to fix a stack overflow vulnerability. The flaw is present in the application, which fails to handle incorrect parsing of SMTP server response codes. Successful exploitation can cause un ...

oval:org.secpod.oval:def:98164
The host is missing a high severity security update according to the Mozilla advisory MFSA2024-07 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle various components. Successful exploitation could lead to multiple impacts.

oval:org.secpod.oval:def:77249
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of ...

oval:org.secpod.oval:def:77247
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol.

oval:org.secpod.oval:def:74782
Mozilla Firefox 92, Mozilla Firefox ESR 78.14, Mozilla Firefox ESR 91.1, Mozilla Thunderbird 78.14, Mozilla Thunderbird 91.1: When delegating navigations to the operating system, Thunderbird would accept the mk scheme which might allow attackers to launch pages and execute scripts in Internet Explor ...

oval:org.secpod.oval:def:67832
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: When <code>flex-basis</code> was used on a table wrapper, a <code>StyleGenericFlexBasis</code> object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentia ...

oval:org.secpod.oval:def:67831
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass.

oval:org.secpod.oval:def:67834
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine.

oval:org.secpod.oval:def:67836
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: When an extension with the proxy permission registered to receive <code><all_urls></code>, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View ...

oval:org.secpod.oval:def:67838
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: Mozilla developer Christian Holler reported memory safety bugs present in Firefox 83 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have b ...

oval:org.secpod.oval:def:67837
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as ...

oval:org.secpod.oval:def:77239
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash.

oval:org.secpod.oval:def:77238
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol.

oval:org.secpod.oval:def:77237
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash.

oval:org.secpod.oval:def:77236
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash.

oval:org.secpod.oval:def:77246
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable.

oval:org.secpod.oval:def:77245
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.

oval:org.secpod.oval:def:77244
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations

oval:org.secpod.oval:def:77243
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.

oval:org.secpod.oval:def:77242
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode.

oval:org.secpod.oval:def:77241
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash.

oval:org.secpod.oval:def:77240
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode.

oval:org.secpod.oval:def:70472
Mozilla Firefox 87, Mozilla Firefox ESR 78.9 and Mozilla Thunderbird 78.9: Mozilla developers and community members Matthew Gregan, Tyson Smith, Julien Wajsberg, and Alexis Beingessner reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memor ...

oval:org.secpod.oval:def:70469
Mozilla Firefox 87, Mozilla Firefox ESR 78.9 and Mozilla Thunderbird 78.9: A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a we ...

oval:org.secpod.oval:def:70466
Mozilla Firefox 87, Mozilla Firefox ESR 78.9 and Mozilla Thunderbird 78.9: A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash.

oval:org.secpod.oval:def:70467
Mozilla Firefox 87, Mozilla Firefox ESR 78.9 and Mozilla Thunderbird 78.9: Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections.

oval:org.secpod.oval:def:74783
Mozilla Firefox 92, Mozilla Firefox ESR 78.14, Mozilla Firefox ESR 91.1, Mozilla Thunderbird 78.14, Mozilla Thunderbird 91.1: Mozilla developers Gabriele Svelto and Tyson Smith reported memory safety bugs present in Firefox 91 and Firefox ESR 78.14. Some of these bugs showed evidence of memory corru ...

oval:org.secpod.oval:def:67829
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers.

oval:org.secpod.oval:def:67828
Mozilla Firefox 84, Mozilla Firefox ESR 78.6, Mozilla Thunderbird 78.6: When a BigInt was right-shifted the backing store was not properly cleared, allowing uninitialized memory to be read.

oval:org.secpod.oval:def:74354
Mozilla Firefox 91,Mozilla Firefox ESR 78.13 and Mozilla Thunderbird 78.13 : Firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash.

oval:org.secpod.oval:def:74355
Mozilla Firefox 91,Mozilla Firefox ESR 78.13 and Mozilla Thunderbird 78.13: Mozilla developers Christoph Kerschbaumer, Olli Pettay, Sandor Molnar, and Simon Giesecke reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and w ...

oval:org.secpod.oval:def:77234
Mozilla Firefox 96, Mozilla Firefox ESR 91.5 and Mozilla Thunderbird 91.5: It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox.

oval:org.secpod.oval:def:74349
Mozilla Firefox 91,Mozilla Firefox ESR 78.13 and Mozilla Thunderbird 78.13 : Uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash.

oval:org.secpod.oval:def:74352
Mozilla Firefox 91,Mozilla Firefox ESR 78.13 and Mozilla Thunderbird 78.13 : Instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection. This led to memory corruption and a potentially exploitable crash.

oval:org.secpod.oval:def:74353
Mozilla Firefox 91,Mozilla Firefox ESR 78.13 and Mozilla Thunderbird 78.13 : A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash.

oval:org.secpod.oval:def:86239
Mozilla Firefox ESR 102.6, Mozilla Thunderbird 102.6 and Mozilla Firefox 107.0 : A use-after-free in WebGL extensions could have led to a potentially exploitable crash.

oval:org.secpod.oval:def:86238
Mozilla Firefox ESR 102.6, Mozilla Thunderbird 102.6 and Mozilla Firefox 106.0 : An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash.

oval:org.secpod.oval:def:86235
Mozilla Firefox 108, Mozilla Firefox ESR 102.6, Mozilla Thunderbird 102.6 : Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107 and Firefox ESR 102.5. Some of these bugs showed evidence of memory corruption and ...

oval:org.secpod.oval:def:86233
Mozilla Firefox 108, Mozilla Firefox ESR 102.6, Mozilla Thunderbird 102.6.1: A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could have potentially led to user confusion and the execution of malicious c ...

oval:org.secpod.oval:def:78012
The host is missing a critical severity security update according to the Mozilla advisory MFSA2022-09 and is prone to a use after free vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to cause un ...

oval:org.secpod.oval:def:78013
Mozilla Firefox 97.0.2, Mozilla Firefox ESR 91.6.1 or Mozilla Thunderbird 91.6.2: Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw.

oval:org.secpod.oval:def:78014
Mozilla Firefox 97.0.2, Mozilla Firefox ESR 91.6.1 or Mozilla Thunderbird 91.6.2: An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw.

oval:org.secpod.oval:def:89114
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user.

oval:org.secpod.oval:def:89111
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious co ...

oval:org.secpod.oval:def:95994
Mozilla Firefox 121, Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to r ...

oval:org.secpod.oval:def:95993
Mozilla Firefox 121, Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : The "ShutdownObserver()" was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor.

oval:org.secpod.oval:def:95991
Mozilla Firefox 121, Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : The "nsWindow::PickerOpen(void)" method was susceptible to a heap buffer overflow when running in headless mode.

oval:org.secpod.oval:def:89109
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially trickin ...

oval:org.secpod.oval:def:89105
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash.

oval:org.secpod.oval:def:89106
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash.

oval:org.secpod.oval:def:89103
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature chec ...

oval:org.secpod.oval:def:89104
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : A website could have obscured the fullscreen notification by using a combination of codewindow.open/code, fullscreen requests, codewindow.name/code assignments, and codesetInterval/code calls. This could have led to user c ...

oval:org.secpod.oval:def:89100
The host is missing a high severity security update according to the Mozilla advisory MFSA2023-15 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to have unspecified imp ...

oval:org.secpod.oval:def:95989
Mozilla Firefox 121, Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : A use-after-free condition affected TLS socket creation when under memory pressure.

oval:org.secpod.oval:def:95988
Mozilla Firefox 121, Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : Firefox was susceptible to a heap buffer overflow in "nsTextFragment" due to insufficient OOM handling.

oval:org.secpod.oval:def:95987
Mozilla Firefox 121, Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : The WebGL "DrawElementsInstanced" method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape.

oval:org.secpod.oval:def:95990
Mozilla Firefox 121, Mozilla Firefox ESR 115.6, Mozilla Thunderbird 115.6 : The "VideoBridge" allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox.

oval:org.secpod.oval:def:89118
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : Mozilla developers Randell Jesup, Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence ...

oval:org.secpod.oval:def:89116
Mozilla Firefox 112, Mozilla Firefox ESR 102.10, Mozilla Thunderbird 102.10 : A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result.

oval:org.secpod.oval:def:98151
Mozilla Firefox 123, Mozilla Firefox ESR 115.8, Mozilla Thunderbird 115.8 : When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read.

oval:org.secpod.oval:def:98152
Mozilla Firefox 123, Mozilla Firefox ESR 115.8, Mozilla Thunderbird 115.8 : Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown).

oval:org.secpod.oval:def:98153
Mozilla Firefox 123, Mozilla Firefox ESR 115.8, Mozilla Thunderbird 115.8 : A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks.

oval:org.secpod.oval:def:93427
Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.

oval:org.secpod.oval:def:93429
Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

oval:org.secpod.oval:def:93027
The host is installed with Google Chrome before 117.0.5938.62, Microsoft Edge before 117.0.2045.31, Mozilla Firefox before 117.0.1, Mozilla Firefox ESR 102.15.1 or 115.0 before 115.2.1, Mozilla Thunderbird 102.15.1 or 115.0 before 115.2.1, Opera Browser before 102.0.4880.51, Brave Browser before 1.5 ...

oval:org.secpod.oval:def:93424
Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash.

oval:org.secpod.oval:def:93025
The host is missing a critical severity security update according to the Mozilla advisory MFSA2023-40 and is prone to a heap buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could lead to a heap buffer ov ...

oval:org.secpod.oval:def:93421
Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : A compromised content process could have provided malicious data to code FilterNodeD2D1code resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

oval:org.secpod.oval:def:93422
Mozilla Firefox 118 Mozilla Firefox ESR 115.3 : A compromised content process could have provided malicious data in a code PathRecording code resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

oval:org.secpod.oval:def:98154
Mozilla Firefox 123, Mozilla Firefox ESR 115.8, Mozilla Thunderbird 115.8 : If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions.

oval:org.secpod.oval:def:98155
Mozilla Firefox 123, Mozilla Firefox ESR 115.8, Mozilla Thunderbird 115.8 : A malicious website could have used a combination of exiting fullscreen mode and requestPointerLock to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently grantin ...

oval:org.secpod.oval:def:98156
Mozilla Firefox 123, Mozilla Firefox ESR 115.8, Mozilla Thunderbird 115.8 : Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cooki ...

oval:org.secpod.oval:def:98157
Mozilla Firefox 123, Mozilla Firefox ESR 115.8, Mozilla Thunderbird 115.8 : Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to r ...

oval:org.secpod.oval:def:58731
The host is missing a high severity security update according to Mozilla advisory, MFSA2019-29. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

oval:org.secpod.oval:def:58732
The host is missing a high severity security update according to Mozilla advisory, MFSA2019-30. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle crafted data. Successful exploitation allows remote attackers to crash the service.

*CPE
cpe:/a:mozilla:thunderbird:::x64

© SecPod Technologies