Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-29qq-gf32-fj2m

Опубликовано: 10 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

EPSS

Процентиль: 8%
0.0003
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
8 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 4.3
redhat
8 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
nvd
8 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.

CVSS3: 5.3
debian
8 месяцев назад

When requesting an OpenPGP key from a WKD server, an incorrect padding ...

CVSS3: 5.3
fstec
9 месяцев назад

Уязвимость почтового клиента Thunderbird, связанная с некорректным импортом ключа OpenPGP с сервера WKD, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 8%
0.0003
Низкий

5.3 Medium

CVSS3