Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-29qq-gf32-fj2m

Опубликовано: 10 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

EPSS

Процентиль: 12%
0.00039
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
10 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 4.3
redhat
10 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
nvd
10 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
debian
10 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding ...

CVSS3: 5.3
fstec
11 месяцев назад

Уязвимость почтового клиента Thunderbird, связанная с некорректным импортом ключа OpenPGP с сервера WKD, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 12%
0.00039
Низкий

5.3 Medium

CVSS3