Search CVE reports
61 – 70 of 2124 results
An attacker with control over a content process could potentially leverage the privileged UITour actor to leak sensitive information or escalate privileges. This vulnerability affects Firefox < 138 and Thunderbird < 138.
9 affected packages
mozjs38, firefox, thunderbird, mozjs52, mozjs68...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Not affected | Not in release | — |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
Due to insufficient escaping of the special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects...
2 affected packages
firefox, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Not affected | Not in release | — |
Some fixes available 1 of 12
A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a...
9 affected packages
mozjs78, firefox, thunderbird, mozjs38, mozjs52...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
mozjs78 | Not in release | Ignored | Not in release | — |
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Fixed | Not in release | — |
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges. *This bug only affects Thunderbird for macOS. Other...
2 affected packages
firefox, thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Not affected | Not in release | — |
Some fixes available 1 of 2
It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent...
1 affected package
thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Fixed | Not in release | — |
Some fixes available 1 of 2
Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type...
1 affected package
thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Fixed | Not in release | — |
Rejected reason: This CVE was marked as fixed, but due to other code landing - was not actually fixed. It was subsequently fixed in CVE-2025-5986.
1 affected package
thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Not affected | Not in release | — |
Some fixes available 1 of 2
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats...
1 affected package
thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Fixed | Not in release | — |
A race condition existed in nsHttpTransaction that could have been exploited to cause memory corruption, potentially leading to an exploitable condition. This vulnerability affects Firefox < 137.0.2.
9 affected packages
firefox, thunderbird, mozjs38, mozjs52, mozjs68...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | Not affected | Not affected | Not in release | — |
thunderbird | Not affected | Not affected | Not in release | — |
mozjs38 | Not in release | Not in release | Not in release | Needs evaluation |
mozjs52 | Not in release | Not in release | Needs evaluation | Ignored |
mozjs68 | Not in release | Not in release | Ignored | — |
mozjs78 | Not in release | Ignored | Not in release | — |
mozjs91 | Not in release | Ignored | Not in release | — |
mozjs102 | Ignored | Ignored | Not in release | — |
mozjs115 | Ignored | Not in release | Not in release | — |
When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the...
1 affected package
thunderbird
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
thunderbird | Not affected | Fixed | Not in release | — |