thunderbird vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the thunderbird package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

*
  • H
Out-of-Bounds

*
  • H
Use After Free

*
  • M
Improper Certificate Validation

*
  • H
Use After Free

*
  • H
Missing Encryption of Sensitive Data

<1:68.9.0-1~deb8u2
  • H
Out-of-Bounds

<1:68.9.0-1~deb8u2
  • H
Insufficient Verification of Data Authenticity

<1:68.9.0-1~deb8u2
  • M
Use After Free

<1:68.9.0-1~deb8u2
  • M
Information Exposure

<1:68.9.0-1~deb8u2
  • M
Origin Validation Error

<1:68.8.0-1~deb8u1
  • H
Race Condition

<1:68.8.0-1~deb8u1
  • C
Buffer Overflow

<1:68.8.0-1~deb8u1
  • M
Information Exposure

<1:68.8.0-1~deb8u1
  • C
Out-of-Bounds

<1:68.8.0-1~deb8u1
  • H
Out-of-Bounds

<1:68.7.0-1~deb8u1
  • C
Out-of-Bounds

<1:68.7.0-1~deb8u1
  • H
Out-of-bounds Write

<1:68.7.0-1~deb8u1
  • H
Use After Free

<1:68.7.0-1~deb8u1
  • H
Double Free

<1:68.7.0-1~deb8u1
  • M
Information Exposure

<1:68.6.0-1~deb8u1
  • H
Use After Free

<1:68.6.0-1~deb8u1
  • H
Use After Free

<1:68.6.0-1~deb8u1
  • H
Arbitrary Code Injection

<1:68.6.0-1~deb8u1
  • H
Out-of-bounds Read

<1:68.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:68.6.0-1~deb8u1
  • M
Out-of-bounds Read

<1:68.6.0-1~deb8u1
  • M
Cross-site Scripting (XSS)

<1:68.5.0-1~deb8u1
  • M
Missing Initialization of Resource

<1:68.5.0-1~deb8u1
  • H
Out-of-Bounds

<1:68.5.0-1~deb8u1
  • M
Insufficiently Protected Credentials

<1:68.5.0-1~deb8u1
  • M
Out-of-bounds Read

<1:68.5.0-1~deb8u1
  • M
NULL Pointer Dereference

<1:68.5.0-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1:68.4.1-1~deb8u1
  • H
Buffer Overflow

<1:68.4.1-1~deb8u1
  • M
Cross-site Scripting (XSS)

<1:68.4.1-1~deb8u1
  • M
Cross-site Scripting (XSS)

<1:68.4.1-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1:68.4.1-1~deb8u1
  • H
Use After Free

<1:68.3.0-2~deb8u1
  • H
Use After Free

<1:68.3.0-2~deb8u1
  • H
Use After Free

<1:68.3.0-2~deb8u1
  • H
Buffer Overflow

<1:68.3.0-2~deb8u1
  • H
Buffer Overflow

<1:68.3.0-2~deb8u1
  • M
Origin Validation Error

<1:68.2.2-1~deb8u1
  • M
Race Condition

<1:68.2.2-1~deb8u1
  • M
Cross-site Scripting (XSS)

<1:68.2.2-1~deb8u1
  • H
Use After Free

<1:68.2.2-1~deb8u1
  • H
Out-of-bounds Write

<1:68.2.2-1~deb8u1
  • H
Use After Free

<1:68.2.2-1~deb8u1
  • H
Buffer Overflow

<1:68.2.2-1~deb8u1
  • H
Improper Verification of Cryptographic Signature

<1:68.2.2-1~deb8u1
  • M
Cleartext Transmission of Sensitive Information

<1:60.9.0-1~deb8u1
  • H
Out-of-bounds Read

<1:68.2.2-1~deb8u1
  • L
Information Exposure

<1:60.9.0-1~deb8u1
  • H
Out-of-Bounds

<1:60.9.0-1~deb8u1
  • H
Use After Free

<1:60.9.0-1~deb8u1
  • H
Use After Free

<1:60.9.0-1~deb8u1
  • M
Inclusion of Functionality from Untrusted Control Sphere

<1:60.9.0-1~deb8u1
  • M
Cross-site Scripting (XSS)

<1:60.9.0-1~deb8u1
  • H
Arbitrary Code Injection

<1:60.8.0-1~deb8u1
  • H
Out-of-Bounds

<1:60.8.0-1
  • C
Use After Free

<1:60.8.0-1~deb8u1
  • H
Cross-site Request Forgery (CSRF)

<1:60.8.0-1~deb8u1
  • M
Cross-site Scripting (XSS)

<1:60.8.0-1~deb8u1
  • M
CVE-2019-11730

<1:60.8.0-1~deb8u1
  • M
Improper Encoding or Escaping of Output

<1:60.8.0-1~deb8u1
  • H
Out-of-bounds Read

<1:60.8.0-1
  • C
Out-of-Bounds

<1:60.8.0-1~deb8u1
  • H
CVE-2019-11711

<1:60.8.0-1~deb8u1
  • C
Improper Input Validation

<1:60.7.2-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1:60.7.2-1~deb8u1
  • C
Out-of-Bounds

<1:60.7.1-1~deb8u1
  • C
Out-of-Bounds

<1:60.7.1-1~deb8u1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1:60.7.1-1~deb8u1
  • C
Out-of-bounds Write

<1:60.7.1-1~deb8u1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<1:60.7.0-1~deb8u1
  • M
Origin Validation Error

<1:60.7.0-1~deb8u1
  • C
Out-of-Bounds

<1:60.7.0-1~deb8u1
  • C
Use After Free

<1:60.7.0-1~deb8u1
  • C
Use After Free

<1:60.7.0-1~deb8u1
  • C
Out-of-Bounds

<1:60.7.0-1~deb8u1
  • C
Improper Input Validation

<1:60.7.0-1~deb8u1
  • C
Use After Free

<1:60.7.0-1~deb8u1
  • M
Improper Input Validation

<1:60.7.0-1~deb8u1
  • H
NULL Pointer Dereference

<1:60.5.1-1~deb8u1
  • C
Use After Free

<1:60.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:60.6.1-1~deb8u1
  • C
Reachable Assertion

<1:60.6.1-1~deb8u1
  • M
Out-of-Bounds

<1:60.6.1-1~deb8u1
  • C
Out-of-Bounds

<1:60.6.1-1~deb8u1
  • C
Use After Free

<1:60.6.1-1~deb8u1
  • C
Use After Free

<1:60.6.1-1~deb8u1
  • C
Improper Input Validation

<1:60.6.1-1~deb8u1
  • M
Origin Validation Error

<1:60.7.0-1~deb8u1
  • M
Out-of-bounds Read

<1:60.7.0-1~deb8u1
  • M
Origin Validation Error

<1:60.3.0-1~deb8u1
  • M
Improper Verification of Cryptographic Signature

<1:60.5.1-1~deb8u1
  • M
Information Exposure

<1:60.7.0-1~deb8u1
  • M
Out-of-bounds Write

<1:60.5.1-1~deb8u1
  • M
Use After Free

<1:60.7.0-1~deb8u1
  • C
Out-of-Bounds

<1:60.5.1-1~deb8u1
  • C
Improper Authentication

<1:60.5.1-1~deb8u1
  • C
Use After Free

<1:60.5.1-1~deb8u1
  • M
CVE-2018-18506

<1:60.6.1-1~deb8u1
  • C
Out-of-Bounds

<1:60.4.0-1~deb8u1
  • C
Use After Free

<1:60.4.0-1~deb8u1
  • C
Out-of-bounds Write

<1:60.4.0-1~deb8u1
  • C
Out-of-Bounds

<1:60.4.0-1~deb8u1
  • M
Origin Validation Error

<1:60.4.0-1~deb8u1
  • H
Out-of-bounds Write

<1:60.5.1-1~deb8u1
  • C
Out-of-Bounds

<1:60.3.0-1~deb8u1
  • H
Out-of-Bounds

<1:60.3.0-1~deb8u1
  • H
Out-of-bounds Write

<1:60.3.0-1~deb8u1
  • C
CVE-2018-12392

<1:60.3.0-1~deb8u1
  • H
Out-of-bounds Read

<1:60.4.0-1~deb8u1
  • H
Improper Input Validation

<1:60.3.0-1~deb8u1
  • M
Insufficiently Protected Credentials

<1:60.3.0-1~deb8u1
  • C
Use After Free

<1:60.3.0-1~deb8u1
  • H
Out-of-bounds Write

<1:60.3.0-1~deb8u1
  • C
Out-of-Bounds

<1:60.3.0-1~deb8u1
  • C
Use After Free

<1:60.3.0-1~deb8u1
  • M
Information Exposure

<1:52.9.1-1~deb8u1
  • H
Cross-site Request Forgery (CSRF)

<1:52.9.1-1~deb8u1
  • H
Use After Free

<1:52.9.1-1~deb8u1
  • H
Use After Free

<1:52.9.1-1~deb8u1
  • M
Out-of-bounds Read

<1:52.9.1-1~deb8u1
  • H
Out-of-Bounds

<1:52.9.1-1~deb8u1
  • H
Integer Overflow or Wraparound

<1:52.9.1-1~deb8u1
  • M
Information Exposure

<1:52.9.1-1~deb8u1
  • C
Out-of-Bounds

<1:52.9.1-1~deb8u1
  • M
Information Exposure

<1:52.9.1-1~deb8u1
  • M
Information Exposure

<1:52.9.1-1~deb8u1
  • H
Integer Overflow or Wraparound

<1:60.3.0-1~deb8u1
  • C
Out-of-Bounds

<1:60.3.0-1~deb8u1
  • H
Integer Overflow or Wraparound

<1:60.3.0-1~deb8u1
  • M
Improper Input Validation

<1:60.3.0-1~deb8u1
  • C
Improper Input Validation

<1:60.3.0-1~deb8u1
  • H
Improper Input Validation

<1:52.4.0-1~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • H
Out-of-Bounds

<1:52.8.0-1~deb8u1
  • C
Integer Overflow or Wraparound

<1:52.6.0-1~deb8u1
  • M
Cross-site Scripting (XSS)

<1:52.4.0-1~deb8u1
  • C
Use After Free

<1:52.5.2-2~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • M
CVE-2017-7830

<1:52.5.2-2~deb8u1
  • H
Out-of-Bounds

<1:52.7.0-1~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • M
CVE-2018-5168

<1:52.8.0-1~deb8u1
  • M
Improper Input Validation

<1:52.8.0-1~deb8u1
  • M
Improper Input Validation

<1:52.8.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.6.0-1~deb8u1
  • H
Inadequate Encryption Strength

<1:52.8.0-1~deb8u1
  • M
Missing Encryption of Sensitive Data

<1:52.8.0-1~deb8u1
  • M
Improper Input Validation

<1:52.5.2-2~deb8u1
  • H
Out-of-Bounds

<1:52.7.0-1~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.4.0-1~deb8u1
  • H
Out-of-bounds Write

<1:52.7.0-1~deb8u1
  • C
Use After Free

<1:52.8.0-1~deb8u1
  • C
Out-of-bounds Write

<1:52.8.0-1~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • H
Arbitrary Code Injection

<1:52.5.2-2~deb8u1
  • C
Use After Free

<1:52.8.0-1~deb8u1
  • C
Use After Free

<1:52.4.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.7.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.8.0-1~deb8u1
  • M
CVE-2018-5117

<1:52.6.0-1~deb8u1
  • M
Arbitrary Code Injection

<1:52.5.2-2~deb8u1
  • C
Use After Free

<1:52.6.0-1~deb8u1
  • H
Integer Overflow or Wraparound

<1:52.7.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.8.0-1~deb8u1
  • C
Use After Free

<1:52.4.0-1~deb8u1
  • H
Missing Encryption of Sensitive Data

<1:52.8.0-1~deb8u1
  • C
Out-of-Bounds

<1:52.5.2-2~deb8u1
  • C
Out-of-Bounds

<1:52.4.0-1~deb8u1
  • C
Use After Free

<1:52.4.0-1~deb8u1
  • M
Information Exposure

<1:52.5.2-2~deb8u1
  • H
Use After Free

<1:52.4.0-1~deb8u1
  • H
Out-of-bounds Write

<1:52.7.0-1~deb8u1
  • M
Information Exposure

<1:60.3.0-1~deb8u1
  • M
Use After Free

<1:60.5.0-1
  • L
CVE-2006-4569

<1.5.0.7-1
  • M
Cross-site Scripting (XSS)

<1.5.0.7-1
  • C
CVE-2006-4571

<1.5.0.7-1
  • L
CVE-2006-4570

<1.5.0.7-1
  • M
Improper Input Validation

<1.5.0.7-1
  • M
CVE-2006-4566

<1.5.0.7-1
  • H
Out-of-Bounds

<1.5.0.7-1
  • L
CVE-2006-4567

<1.5.0.7-1
  • H
Access Restriction Bypass

<1.5.0.7-1
  • L
CVE-2006-3812

<1.5.0.5-1
  • M
CVE-2006-3802

<1.5.0.5-1
  • H
CVE-2006-3113

<1.5.0.5-1
  • H
CVE-2006-3801

<1.5.0.5-1
  • H
CVE-2006-3809

<1.5.0.5-1
  • H
CVE-2006-3805

<1.5.0.5-1
  • H
CVE-2006-3808

<1.5.0.5-1
  • M
CVE-2006-3810

<1.5.0.5-1
  • H
CVE-2006-3811

<1.5.0.5-1
  • M
CVE-2006-3804

<1.5.0.5-1
  • M
CVE-2006-3803

<1.5.0.5-1
  • H
CVE-2006-3807

<1.5.0.5-1
  • H
Numeric Errors

<1.5.0.5-1
  • H
CVE-2006-2787

<1.5.0.4-1
  • L
CVE-2006-2786

<1.5.0.4-1
  • H
Arbitrary Code Injection

<1.5.0.4-1
  • M
Out-of-Bounds

<1.5.0.4-1
  • H
Arbitrary Code Injection

<1.5.0.4-1
  • M
Cross-site Scripting (XSS)

<1.5.0.4-1
  • M
CVE-2006-2778

<1.5.0.4-1
  • H
Access Restriction Bypass

<1.5.0.4-1
  • H
CVE-2006-2776

<1.5.0.4-1
  • C
Resource Management Errors

<1.5.0.2-1
  • M
CVE-2006-1738

<1.5.0.2-1
  • H
Numeric Errors

<1.5.0.2-1
  • H
Numeric Errors

<1.5.0.2-1
  • H
CVE-2006-1531

<1.5.0.2-1
  • H
CVE-2006-1727

<1.5.0.2-1
  • H
Out-of-Bounds

<1.5.0.2-1
  • M
Access Restriction Bypass

<1.5.0.2-1
  • M
CVE-2006-1734

<1.5.0.2-1
  • H
CVE-2006-1529

<1.5.0.2-1
  • H
CVE-2006-1724

<1.5.0.2-1
  • H
CVE-2006-1728

<1.5.0.2-1
  • H
CVE-2006-1530

<1.5.0.2-1
  • M
Cross-site Scripting (XSS)

<1.5.0.2-1
  • H
Access Restriction Bypass

<1.5.0.2-1
  • L
CVE-2006-1740

<1.5.0.2-1
  • H
Resource Management Errors

<1.5.0.2-1
  • H
CVE-2006-1723

<1.5.0.2-1
  • H
Resource Management Errors

<1.5.0.2-1
  • M
CVE-2006-1742

<1.5.0.2-1
  • H
Access Restriction Bypass

<1.5.0.2-1
  • M
CVE-2006-1732

<1.5.0.2-1
  • M
Cross-site Scripting (XSS)

<1.5.0.2-1
  • L
CVE-2006-1045

<1.5.0.2-1
  • H
Improper Input Validation

<1.5.0.2-1
  • M
CVE-2006-0299

<1.5.0.2-1
  • M
Improper Input Validation

<1.5.0.2-1
  • M
CVE-2006-0297

<1.5.0.2-1
  • M
CVE-2006-0296

<1.5.0.2-1
  • H
CVE-2006-0294

<1.5.0.2-1
  • M
CVE-2006-0295

<1.5.0.2-1
  • H
CVE-2006-0292

<1.5.0.2-1
  • M
CVE-2005-2353

<1.5.0.2-1