A free email application from Mozilla that's easy to set up and customize

Thunderbird (32-bit)

Thunderbird 31.2.0

  -  25.25 MB  -  Open Source
  • Latest Version

    Thunderbird 132.0.1 (32-bit)

  • Operating System

    Windows XP / XP64 / Vista / Vista64 / Windows 7 / Windows 7 64 / Windows 8 / Windows 8 64

  • User Rating

    Click to vote
  • Author / Product

    Mozilla Organization / External Link

  • Filename

    Thunderbird Setup 31.2.0.exe

  • MD5 Checksum

    ace66557dc503fc982214675bb55f80c

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Thunderbird 31.2.0.


For those interested in downloading the most recent release of Thunderbird (32-bit) or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Thunderbird 31.2.0 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Thunderbird 31.2.0 Screenshot 1
  • Thunderbird 31.2.0 Screenshot 2

What's new in this version:

Fixed:
- Fixed a case where having a contact and card in an address book with the same name could send to the mailing list (Bug 1008718) Security fixes:
- Critical: Vulnerability can be used to run attacker code and install software, requiring no user interaction beyond normal browsing.
- High: Vulnerability can be used to gather sensitive data from sites in other windows or inject data or code into those sites, requiring no more than normal browsing actions.
- Moderate: Vulnerabilities that would otherwise be High or Critical except they only work in uncommon non-default configurations or require the user to perform complicated and/or unlikely steps.
- Low: Minor security vulnerabilities such as Denial of Service attacks, minor data leaks, or spoofs. (Undetectable spoofs of SSL indicia would have "High" impact because those are generally used to steal sensitive data intended for other sites.)