# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-43546 |
1021 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. |
2 |
CVE-2021-43545 |
834 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. |
3 |
CVE-2021-43543 |
79 |
|
XSS |
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. |
4 |
CVE-2021-43542 |
209 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. |
5 |
CVE-2021-43541 |
|
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. |
6 |
CVE-2021-43540 |
|
|
|
2021-12-08 |
2022-07-12 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
WebExtensions with the correct permissions were able to create and install ServiceWorkers for third-party websites that would not have been uninstalled with the extension. This vulnerability affects Firefox < 95. |
7 |
CVE-2021-43538 |
362 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. |
8 |
CVE-2021-43536 |
668 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. |
9 |
CVE-2021-43533 |
|
|
|
2021-12-08 |
2021-12-10 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94. |
10 |
CVE-2021-43531 |
346 |
|
|
2021-12-08 |
2021-12-10 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox < 94. |
11 |
CVE-2021-43528 |
269 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0. |
12 |
CVE-2021-38509 |
1021 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. |
13 |
CVE-2021-38508 |
1021 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. |
14 |
CVE-2021-38507 |
346 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. |
15 |
CVE-2021-38506 |
1021 |
|
|
2021-12-08 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. |
16 |
CVE-2021-38502 |
|
|
Exec Code |
2021-11-03 |
2022-07-12 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2. |
17 |
CVE-2021-38497 |
346 |
|
|
2021-11-03 |
2021-11-04 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2. |
18 |
CVE-2021-38491 |
|
|
|
2021-11-03 |
2022-03-16 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox < 92. |
19 |
CVE-2021-29982 |
772 |
|
|
2021-08-17 |
2022-03-16 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox < 91 and Thunderbird < 91. |
20 |
CVE-2021-29979 |
79 |
|
XSS |
2021-08-02 |
2021-08-11 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Hubs Cloud allows users to download shared content, specifically HTML and JS, which could allow javascript execution in the Hub Cloud instance’s primary hosting domain.*. This vulnerability affects Hubs Cloud < mozillareality/reticulum/1.0.1/20210618012634. |
21 |
CVE-2021-29975 |
|
|
|
2021-08-05 |
2022-03-16 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Through a series of DOM manipulations, a message, over which the attacker had control of the text but not HTML or formatting, could be overlaid on top of another domain (with the new domain correctly shown in the address bar) resulting in possible user confusion. This vulnerability affects Firefox < 90. |
22 |
CVE-2021-29969 |
552 |
|
|
2021-08-05 |
2022-12-09 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12. |
23 |
CVE-2021-29965 |
610 |
|
|
2021-06-24 |
2021-06-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A malicious website that causes an HTTP Authentication dialog to be spawned could trick the built-in password manager to suggest passwords for the currently active website instead of the website that triggered the dialog. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89. |
24 |
CVE-2021-29963 |
345 |
|
|
2021-06-24 |
2021-07-01 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Address bar search suggestions in private browsing mode were re-using session data from normal mode. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89. |
25 |
CVE-2021-29962 |
404 |
|
|
2021-06-24 |
2021-06-25 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
Firefox for Android would become unstable and hard-to-recover when a website opened too many popups. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89. |
26 |
CVE-2021-29961 |
863 |
|
|
2021-06-24 |
2021-09-20 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
When styling and rendering an oversized `<select>` element, Firefox did not apply correct clipping which allowed an attacker to paint over the user interface. This vulnerability affects Firefox < 89. |
27 |
CVE-2021-29960 |
669 |
|
|
2021-06-24 |
2021-09-20 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Firefox used to cache the last filename used for printing a file. When generating a filename for printing, Firefox usually suggests the web page title. The caching and suggestion techniques combined may have lead to the title of a website visited during private browsing mode being stored on disk. This vulnerability affects Firefox < 89. |
28 |
CVE-2021-29959 |
863 |
|
|
2021-06-24 |
2022-07-12 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
When a user has already allowed a website to access microphone and camera, disabling camera sharing would not fully prevent the website from re-enabling it without an additional prompt. This was only possible if the website kept recording with the microphone until re-enabling the camera. This vulnerability affects Firefox < 89. |
29 |
CVE-2021-29958 |
862 |
|
|
2021-06-24 |
2022-07-12 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
When a download was initiated, the client did not check whether it was in normal or private browsing mode, which led to private mode cookies being shared in normal browsing mode. This vulnerability affects Firefox for iOS < 34. |
30 |
CVE-2021-29957 |
|
|
|
2021-06-24 |
2021-06-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
If a MIME encoded email contains an OpenPGP inline signed or encrypted message part, but also contains an additional unprotected part, Thunderbird did not indicate that only parts of the message are protected. This vulnerability affects Thunderbird < 78.10.2. |
31 |
CVE-2021-29956 |
312 |
|
|
2021-06-24 |
2021-06-30 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird < 78.10.2. |
32 |
CVE-2021-29953 |
79 |
|
XSS |
2021-06-24 |
2021-06-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A malicious webpage could have forced a Firefox for Android user into executing attacker-controlled JavaScript in the context of another domain, resulting in a Universal Cross-Site Scripting vulnerability. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected. Further details are being temporarily withheld to allow users an opportunity to update.*. This vulnerability affects Firefox < 88.0.1 and Firefox for Android < 88.1.3. |
33 |
CVE-2021-29949 |
427 |
|
|
2021-06-24 |
2021-06-30 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1. |
34 |
CVE-2021-29945 |
682 |
|
|
2021-06-24 |
2021-06-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. |
35 |
CVE-2021-29944 |
79 |
|
Exec Code XSS |
2021-06-24 |
2021-07-02 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 88. |
36 |
CVE-2021-24001 |
668 |
|
|
2021-06-24 |
2021-07-02 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88. |
37 |
CVE-2021-23998 |
345 |
|
|
2021-06-24 |
2021-07-02 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88. |
38 |
CVE-2021-23996 |
|
|
|
2021-06-24 |
2021-07-02 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user. This vulnerability affects Firefox < 88. |
39 |
CVE-2021-23993 |
327 |
|
|
2021-06-24 |
2021-07-06 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1. |
40 |
CVE-2021-23992 |
347 |
|
|
2021-06-24 |
2021-07-08 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1. |
41 |
CVE-2021-23991 |
|
|
|
2021-06-24 |
2021-07-08 |
4.0 |
None |
Remote |
High |
Not required |
Partial |
Partial |
None |
If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1. |
42 |
CVE-2021-23986 |
346 |
|
Bypass |
2021-03-31 |
2021-08-06 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87. |
43 |
CVE-2021-23985 |
|
|
|
2021-03-31 |
2022-07-12 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
If an attacker is able to alter specific about:config values (for example malware running on the user's computer), the Devtools remote debugging feature could have been enabled in a way that was unnoticable to the user. This would have allowed a remote attacker (able to make a direct network connection to the victim) to monitor the user's browsing activity and (plaintext) network traffic. This was addressed by providing a visual cue when Devtools has an open network socket. This vulnerability affects Firefox < 87. |
44 |
CVE-2021-23984 |
290 |
|
|
2021-03-31 |
2021-08-06 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9. |
45 |
CVE-2021-23983 |
787 |
|
Mem. Corr. |
2021-03-31 |
2022-05-03 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
By causing a transition on a parent node by removing a CSS rule, an invalid property for a marker could have been applied, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 87. |
46 |
CVE-2021-23982 |
326 |
|
|
2021-03-31 |
2021-08-06 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9. |
47 |
CVE-2021-23975 |
862 |
|
|
2021-02-26 |
2022-05-27 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
The developer page about:memory has a Measure function for exploring what object types the browser has allocated and their sizes. When this function was invoked we incorrectly called the sizeof function, instead of using the API method that checks for invalid pointers. This vulnerability affects Firefox < 86. |
48 |
CVE-2021-23974 |
|
|
XSS Bypass |
2021-02-26 |
2022-05-23 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
The DOMParser API did not properly process '<noscript>' elements for escaping. This could be used as an mXSS vector to bypass an HTML Sanitizer. This vulnerability affects Firefox < 86. |
49 |
CVE-2021-23973 |
209 |
|
|
2021-02-26 |
2022-05-27 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8. |
50 |
CVE-2021-23971 |
|
|
|
2021-02-26 |
2022-05-27 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
When processing a redirect with a conflicting Referrer-Policy, Firefox would have adopted the redirect's Referrer-Policy. This would have potentially resulted in more information than intended by the original origin being provided to the destination of the redirect. This vulnerability affects Firefox < 86. |