Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-15646

Опубликовано: 08 окт. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.9

Описание

If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker. This vulnerability affects Thunderbird < 68.10.0.

РелизСтатусПримечание
bionic

released

1:68.10.0+build1-0ubuntu0.18.04.1
devel

released

1:68.10.0+build1-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

1:68.10.0+build1-0ubuntu0.20.04.1
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

released

1:68.10.0-1
xenial

released

1:68.10.0+build1-0ubuntu0.16.04.1

Показывать по

EPSS

Процентиль: 48%
0.00254
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 5 лет назад

If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker. This vulnerability affects Thunderbird < 68.10.0.

CVSS3: 5.9
nvd
больше 5 лет назад

If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker. This vulnerability affects Thunderbird < 68.10.0.

CVSS3: 5.9
debian
больше 5 лет назад

If an attacker intercepts Thunderbird's initial attempt to perform aut ...

github
больше 3 лет назад

If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker. This vulnerability affects Thunderbird < 68.10.0.

EPSS

Процентиль: 48%
0.00254
Низкий

4.3 Medium

CVSS2

5.9 Medium

CVSS3