Логотип exploitDog
bind:CVE-2021-29969
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-29969

Количество 12

Количество 12

ubuntu логотип

CVE-2021-29969

около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2021-29969

около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2021-29969

около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2021-29969

около 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
EPSS: Низкий
rocky логотип

RLSA-2021:2883

около 4 лет назад

Important: thunderbird security update

EPSS: Низкий
github логотип

GHSA-ggp3-c9px-5c4p

около 3 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2021-03662

около 4 лет назад

Уязвимость почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2458-1

около 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1091-1

около 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2458-1

около 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2883

около 4 лет назад

ELSA-2021-2883: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2881

около 4 лет назад

ELSA-2021-2881: thunderbird security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
0%
Низкий
около 4 лет назад
rocky логотип
RLSA-2021:2883

Important: thunderbird security update

0%
Низкий
около 4 лет назад
github логотип
GHSA-ggp3-c9px-5c4p

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2021-03662

Уязвимость почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2458-1

Security update for MozillaThunderbird

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1091-1

Security update for MozillaThunderbird

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2458-1

Security update for MozillaThunderbird

около 4 лет назад
oracle-oval логотип
ELSA-2021-2883

ELSA-2021-2883: thunderbird security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-2881

ELSA-2021-2881: thunderbird security update (IMPORTANT)

около 4 лет назад

Уязвимостей на страницу