Логотип exploitDog
bind:"BDU:2021-03662" OR bind:"CVE-2021-29969"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-03662" OR bind:"CVE-2021-29969"

Количество 12

Количество 12

fstec логотип

BDU:2021-03662

больше 4 лет назад

Уязвимость почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-ggp3-c9px-5c4p

больше 3 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2458-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1091-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2458-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
rocky логотип

RLSA-2021:2883

больше 4 лет назад

Important: thunderbird security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2883

больше 4 лет назад

ELSA-2021-2883: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2881

больше 4 лет назад

ELSA-2021-2881: thunderbird security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-03662

Уязвимость почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
github логотип
GHSA-ggp3-c9px-5c4p

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2458-1

Security update for MozillaThunderbird

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1091-1

Security update for MozillaThunderbird

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2458-1

Security update for MozillaThunderbird

больше 4 лет назад
rocky логотип
RLSA-2021:2883

Important: thunderbird security update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2883

ELSA-2021-2883: thunderbird security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2881

ELSA-2021-2881: thunderbird security update (IMPORTANT)

больше 4 лет назад

Уязвимостей на страницу