Vulnerabilities > Mozilla > Thunderbird > 91.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-12-08 | CVE-2021-43538 | Race Condition vulnerability in multiple products By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. | 4.3 |
2021-12-08 | CVE-2021-43539 | Use After Free vulnerability in multiple products Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. | 8.8 |
2021-12-08 | CVE-2021-43541 | When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. | 6.5 |
2021-12-08 | CVE-2021-43542 | Information Exposure Through an Error Message vulnerability in multiple products Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. | 6.5 |
2021-12-08 | CVE-2021-43543 | Cross-site Scripting vulnerability in multiple products Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. | 6.1 |
2021-12-08 | CVE-2021-43545 | Excessive Iteration vulnerability in multiple products Using the Location API in a loop could have caused severe application hangs and crashes. | 6.5 |
2021-12-08 | CVE-2021-43546 | Improper Restriction of Rendered UI Layers or Frames vulnerability in multiple products It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. | 4.3 |
2021-09-06 | CVE-2021-40529 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products The ElGamal implementation in Botan through 2.18.1, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | 5.9 |