Multiple vulnerabilities in Mozilla Thunderbird, including use-after-free, IPC, memory corruption allowing for DoS and arbitrary code executio
Reporter | Title | Published | Views | Family All 184 |
---|---|---|---|---|
![]() | Mozilla Thunderbird < 60.5 | 5 Feb 201900:00 | – | nessus |
![]() | Mozilla Thunderbird < 60.5 | 5 Feb 201900:00 | – | nessus |
![]() | Oracle Linux 7 : thunderbird (ELSA-2019-0270) | 5 Feb 201900:00 | – | nessus |
![]() | Scientific Linux Security Update : thunderbird on SL6.x i386/x86_64 (20190204) | 6 Feb 201900:00 | – | nessus |
![]() | Oracle Linux 6 : thunderbird (ELSA-2019-0269) | 5 Feb 201900:00 | – | nessus |
![]() | CentOS 7 : thunderbird (CESA-2019:0270) | 11 Feb 201900:00 | – | nessus |
![]() | RHEL 6 : thunderbird (RHSA-2019:0269) | 5 Feb 201900:00 | – | nessus |
![]() | RHEL 7 : thunderbird (RHSA-2019:0270) | 5 Feb 201900:00 | – | nessus |
![]() | CentOS 6 : thunderbird (CESA-2019:0269) | 11 Feb 201900:00 | – | nessus |
![]() | Scientific Linux Security Update : thunderbird on SL7.x x86_64 (20190204) | 7 Feb 201900:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo