Show filters
1,460 Total Results
Displaying 241-250 of 1,460
Sort by:
Attacker Value
Unknown

CVE-2023-23601

Disclosure Date: June 02, 2023 (last updated February 25, 2025)
Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
Attacker Value
Unknown

CVE-2023-23599

Disclosure Date: June 02, 2023 (last updated February 25, 2025)
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
Attacker Value
Unknown

CVE-2023-23598

Disclosure Date: June 02, 2023 (last updated October 08, 2023)
Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
Attacker Value
Unknown

CVE-2023-1945

Disclosure Date: June 02, 2023 (last updated February 25, 2025)
Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.10 and Firefox ESR < 102.10.
Attacker Value
Unknown

CVE-2023-0767

Disclosure Date: June 02, 2023 (last updated October 08, 2023)
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
Attacker Value
Unknown

CVE-2023-0616

Disclosure Date: June 02, 2023 (last updated February 25, 2025)
If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird < 102.8.
Attacker Value
Unknown

CVE-2023-0547

Disclosure Date: June 02, 2023 (last updated February 25, 2025)
OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird < 102.10.
Attacker Value
Unknown

CVE-2023-0430

Disclosure Date: June 02, 2023 (last updated February 25, 2025)
Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1.
Attacker Value
Unknown

CVE-2021-43529

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages. Thunderbird versions 91.3.0 and later will not call the vulnerable code when processing S/MIME messages that contain certificates with DER-encoded DSA or RSA-PSS signatures.
Attacker Value
Unknown

CVE-2022-46882

Disclosure Date: December 22, 2022 (last updated February 24, 2025)
A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6.