Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15685

Опубликовано: 22 дек. 2022
Источник: debian
EPSS Низкий

Описание

During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
thunderbirdfixed1:78.7.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2021-05/#CVE-2020-15685

EPSS

Процентиль: 70%
0.00622
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 3 лет назад

During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.

CVSS3: 8.8
redhat
около 5 лет назад

During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.

CVSS3: 8.8
nvd
около 3 лет назад

During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.

CVSS3: 8.8
github
около 3 лет назад

During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.

CVSS3: 6.5
fstec
около 5 лет назад

Уязвимость почтового клиента Thunderbird, связанная с недостаточной проверкой вводимых данных на этапе настройки соединения IMAP STARTTLS, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 70%
0.00622
Низкий