Количество 12
Количество 12
CVE-2020-15685
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
CVE-2020-15685
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
CVE-2020-15685
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
CVE-2020-15685
During the plaintext phase of the STARTTLS connection setup, protocol ...
GHSA-c839-4fpv-9xp7
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
BDU:2021-02078
Уязвимость почтового клиента Thunderbird, связанная с недостаточной проверкой вводимых данных на этапе настройки соединения IMAP STARTTLS, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
openSUSE-SU-2021:0209-1
Security update for MozillaThunderbird
openSUSE-SU-2021:0208-1
Security update for MozillaThunderbird
SUSE-SU-2021:0257-1
Security update for MozillaThunderbird
SUSE-SU-2021:0245-1
Security update for MozillaThunderbird
ELSA-2021-0298
ELSA-2021-0298: thunderbird security update (IMPORTANT)
ELSA-2021-0297
ELSA-2021-0297: thunderbird security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-15685 During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7. | CVSS3: 8.8 | 1% Низкий | около 3 лет назад | |
CVE-2020-15685 During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7. | CVSS3: 8.8 | 1% Низкий | около 5 лет назад | |
CVE-2020-15685 During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7. | CVSS3: 8.8 | 1% Низкий | около 3 лет назад | |
CVE-2020-15685 During the plaintext phase of the STARTTLS connection setup, protocol ... | CVSS3: 8.8 | 1% Низкий | около 3 лет назад | |
GHSA-c839-4fpv-9xp7 During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7. | CVSS3: 8.8 | 1% Низкий | около 3 лет назад | |
BDU:2021-02078 Уязвимость почтового клиента Thunderbird, связанная с недостаточной проверкой вводимых данных на этапе настройки соединения IMAP STARTTLS, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации | CVSS3: 6.5 | 1% Низкий | около 5 лет назад | |
openSUSE-SU-2021:0209-1 Security update for MozillaThunderbird | около 5 лет назад | |||
openSUSE-SU-2021:0208-1 Security update for MozillaThunderbird | около 5 лет назад | |||
SUSE-SU-2021:0257-1 Security update for MozillaThunderbird | около 5 лет назад | |||
SUSE-SU-2021:0245-1 Security update for MozillaThunderbird | около 5 лет назад | |||
ELSA-2021-0298 ELSA-2021-0298: thunderbird security update (IMPORTANT) | около 5 лет назад | |||
ELSA-2021-0297 ELSA-2021-0297: thunderbird security update (IMPORTANT) | около 5 лет назад |
Уязвимостей на страницу