Количество 12
Количество 12
GHSA-63rr-fhmr-42fq
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVE-2023-50762
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVE-2023-50762
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.

CVE-2023-50762
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.
CVE-2023-50762
When processing a PGP/MIME payload that contains digitally signed text ...

BDU:2023-09000
Уязвимость почтового клиента Thunderbird, связанная с ошибками обработки криптографической подписи OpenPGP, позволяющая нарушителю осуществить спуфинг-атаку

ROS-20250717-04
Множественные уязвимости thunderbird

SUSE-SU-2024:0044-1
Security update for MozillaThunderbird

RLSA-2024:0003
Important: thunderbird security update
ELSA-2024-0027
ELSA-2024-0027: thunderbird security update (IMPORTANT)
ELSA-2024-0003
ELSA-2024-0003: thunderbird security update (IMPORTANT)
ELSA-2024-0001
ELSA-2024-0001: thunderbird security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-63rr-fhmr-42fq When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-50762 When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-50762 When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-50762 When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад |
CVE-2023-50762 When processing a PGP/MIME payload that contains digitally signed text ... | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2023-09000 Уязвимость почтового клиента Thunderbird, связанная с ошибками обработки криптографической подписи OpenPGP, позволяющая нарушителю осуществить спуфинг-атаку | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | ROS-20250717-04 Множественные уязвимости thunderbird | CVSS3: 7.5 | около 1 месяца назад | |
![]() | SUSE-SU-2024:0044-1 Security update for MozillaThunderbird | больше 1 года назад | ||
![]() | RLSA-2024:0003 Important: thunderbird security update | больше 1 года назад | ||
ELSA-2024-0027 ELSA-2024-0027: thunderbird security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-0003 ELSA-2024-0003: thunderbird security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-0001 ELSA-2024-0001: thunderbird security update (IMPORTANT) | больше 1 года назад |
Уязвимостей на страницу