Known Vulnerabilities for Thunderbird by Mozilla

Listed below are 10 of the newest known vulnerabilities associated with the software "Thunderbird" by "Mozilla".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-43527 NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-enco... Not Provided 2021-12-08 2022-04-20
CVE-2021-23982 Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hos... 6.5 - MEDIUM 2021-03-31 2021-08-06
CVE-2021-23981 A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, re... 8.1 - HIGH 2021-03-31 2022-05-03
CVE-2021-23978 Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence... 8.8 - HIGH 2021-02-26 2022-05-27
CVE-2021-23973 When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of ... 6.5 - MEDIUM 2021-02-26 2022-05-27
CVE-2021-23969 As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the... 4.3 - MEDIUM 2021-02-26 2022-05-27
CVE-2021-23968 If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in t... 4.3 - MEDIUM 2021-02-26 2022-05-27
CVE-2021-23964 Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence... 8.8 - HIGH 2021-02-26 2022-05-03
CVE-2021-23960 Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploita... 8.8 - HIGH 2021-02-26 2021-03-03
CVE-2021-23954 Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a ... 8.8 - HIGH 2021-02-26 2021-03-03

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language

Popular searches for Thunderbird

Thunderbird — Make Email Easier.

Thunderbird Make Email Easier. Thunderbird o m k is a free email application thats easy to set up and customize - and its loaded with great features! Mozilla Thunderbird Email Download Free software Application software X86-64 Microsoft Windows Software release life cycle User (computing) Privacy Personalization Make (software) Blog Instruction set architecture Installation (computer programs) MacOS Linux 32-bit 64-bit computing Plug-in (computing)

Thunderbird:Home - MozillaWiki

Thunderbird:Home - MozillaWiki Welcome to the Thunderbird Q O M Project's community page, with links to commonly requested information. The Thunderbird - product is developed and managed by the Thunderbird Y W Project, which is collectively the community both paid staff and volunteers and the Thunderbird s q o Council:. The community has continuously shipped releases with bug fixes and enhancements for many years. The Mozilla 7 5 3 Foundation is the project's legal and fiscal home. Mozilla Thunderbird Software release life cycle Mozilla Foundation Firefox Patch (computing) User (computing) Information Firefox version history Bugzilla Software versioning Software bug Suggested Upper Merged Ontology Blog Virtual community Internet Relay Chat Mozilla Open Badges Product (business) Unicode Software deployment Source code

© 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status