Логотип exploitDog
bind:CVE-2021-29969
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-29969

Количество 12

Количество 12

ubuntu логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2021-29969

больше 4 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-ggp3-c9px-5c4p

больше 3 лет назад

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2021-03662

больше 4 лет назад

Уязвимость почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2458-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1091-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2458-1

больше 4 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
rocky логотип

RLSA-2021:2883

больше 4 лет назад

Important: thunderbird security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2883

больше 4 лет назад

ELSA-2021-2883: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-2881

больше 4 лет назад

ELSA-2021-2881: thunderbird security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-29969

If Thunderbird was configured to use STARTTLS for an IMAP connection, ...

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
github логотип
GHSA-ggp3-c9px-5c4p

If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03662

Уязвимость почтового клиента Mozilla Thunderbird, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2458-1

Security update for MozillaThunderbird

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1091-1

Security update for MozillaThunderbird

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2458-1

Security update for MozillaThunderbird

больше 4 лет назад
rocky логотип
RLSA-2021:2883

Important: thunderbird security update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2883

ELSA-2021-2883: thunderbird security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2021-2881

ELSA-2021-2881: thunderbird security update (IMPORTANT)

больше 4 лет назад

Уязвимостей на страницу