Логотип exploitDog
bind:"CVE-2021-29969" OR bind:"CVE-2021-29976" OR bind:"CVE-2021-30547" OR bind:"CVE-2021-29970"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-29969" OR bind:"CVE-2021-29976" OR bind:"CVE-2021-30547" OR bind:"CVE-2021-29970"

Количество 45

Количество 45

suse-cvrf логотип

openSUSE-SU-2021:2458-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1091-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2458-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
rocky логотип

RLSA-2021:2883

больше 4 лет назад

Important: thunderbird security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2883

больше 4 лет назад

ELSA-2021-2883: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2881

больше 4 лет назад

ELSA-2021-2881: thunderbird security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2393-1

больше 4 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1066-1

больше 4 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2478-1

больше 4 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2393-1

больше 4 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2389-1

больше 4 лет назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14766-1

больше 4 лет назад

Security update for MozillaFirefox

EPSS: Низкий
rocky логотип

RLSA-2021:2743

больше 4 лет назад

Important: firefox security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2743

больше 4 лет назад

ELSA-2021-2743: firefox security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2741

больше 4 лет назад

ELSA-2021-2741: firefox security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-ggp3-c9px-5c4p

больше 3 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
openSUSE-SU-2021:2458-1

Security update for MozillaThunderbird

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1091-1

Security update for MozillaThunderbird

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2458-1

Security update for MozillaThunderbird

больше 4 лет назад
rocky логотип
RLSA-2021:2883

Important: thunderbird security update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2883

ELSA-2021-2883: thunderbird security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2881

ELSA-2021-2881: thunderbird security update (IMPORTANT)

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2393-1

Security update for MozillaFirefox

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1066-1

Security update for MozillaFirefox

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2478-1

Security update for MozillaFirefox

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2393-1

Security update for MozillaFirefox

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2389-1

Security update for MozillaFirefox

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14766-1

Security update for MozillaFirefox

больше 4 лет назад
rocky логотип
RLSA-2021:2743

Important: firefox security update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2743

ELSA-2021-2743: firefox security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2741

ELSA-2021-2741: firefox security update (IMPORTANT)

больше 4 лет назад
ubuntu логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
github логотип
GHSA-ggp3-c9px-5c4p

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу