Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-29qq-gf32-fj2m

Опубликовано: 10 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

EPSS

Процентиль: 13%
0.00041
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 года назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 4.3
redhat
около 1 года назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
nvd
около 1 года назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
debian
около 1 года назад

When requesting an OpenPGP key from a WKD server, an incorrect padding ...

CVSS3: 5.3
fstec
около 1 года назад

Уязвимость почтового клиента Thunderbird, связанная с некорректным импортом ключа OpenPGP с сервера WKD, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 13%
0.00041
Низкий

5.3 Medium

CVSS3