Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-4083

Опубликовано: 29 апр. 2025
Источник: nvd
CVSS3: 9.1
EPSS Низкий

Описание

A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
Версия до 115.23 (исключая)
cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
Версия до 138.0 (исключая)
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
Версия от 128.0 (включая) до 128.10 (исключая)
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*
Версия до 128.10.0 (исключая)
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
Версия до 138.0 (исключая)

EPSS

Процентиль: 17%
0.00055
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-653

Связанные уязвимости

CVSS3: 9.1
ubuntu
3 месяца назад

A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.

CVSS3: 8.3
redhat
3 месяца назад

A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.

CVSS3: 9.1
debian
3 месяца назад

A process isolation vulnerability in Thunderbird stemmed from improper ...

CVSS3: 9.1
github
3 месяца назад

A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10.

CVSS3: 9.1
fstec
3 месяца назад

Уязвимость компонента Javascript URI Handler браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 17%
0.00055
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-653