Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-1943

Опубликовано: 04 мар. 2025
Источник: debian
EPSS Низкий

Описание

Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136 and Thunderbird < 136.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed136.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-14/#CVE-2025-1943

EPSS

Процентиль: 27%
0.00093
Низкий

Связанные уязвимости

CVSS3: 8.2
ubuntu
4 месяца назад

Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136 and Thunderbird < 136.

CVSS3: 8.8
redhat
4 месяца назад

Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136 and Thunderbird < 136.

CVSS3: 8.2
nvd
4 месяца назад

Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136 and Thunderbird < 136.

CVSS3: 8.2
github
4 месяца назад

Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136.

CVSS3: 8.2
fstec
4 месяца назад

Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 27%
0.00093
Низкий