Vulnerabilities > Mozilla > Thunderbird > 91.0.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-11-03 | CVE-2021-38497 | Origin Validation Error vulnerability in Mozilla Firefox Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. | 6.5 |
2021-11-03 | CVE-2021-38498 | Use After Free vulnerability in Mozilla Firefox During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. | 7.5 |
2021-11-03 | CVE-2021-38500 | Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. | 8.8 |
2021-11-03 | CVE-2021-38501 | Unspecified vulnerability in Mozilla Firefox Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. | 8.8 |
2021-11-03 | CVE-2021-38502 | Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. | 5.9 |
2021-09-06 | CVE-2021-40529 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products The ElGamal implementation in Botan through 2.18.1, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | 5.9 |