Логотип exploitDog
bind:"GHSA-rg69-33g2-mp48" OR bind:"CVE-2025-3875"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-rg69-33g2-mp48" OR bind:"CVE-2025-3875"

Количество 10

Количество 10

github логотип

GHSA-rg69-33g2-mp48

около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-3875

около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-3875

около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-3875

около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-3875

около 1 месяца назад

Thunderbird parses addresses in a way that can allow sender spoofing i ...

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-04709

4 месяца назад

Уязвимость почтового клиента Thunderbird, связанная с некорректной обработкой заголовка p2-from, позволяющая нарушителю проводить спуфинг атаки

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01660-2

21 день назад

Security update for MozillaThunderbird

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01660-1

28 дней назад

Security update for MozillaThunderbird

EPSS: Низкий
oracle-oval логотип

ELSA-2025-8203

24 дня назад

ELSA-2025-8203: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-8756

10 дней назад

ELSA-2025-8756: thunderbird security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-rg69-33g2-mp48

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
ubuntu логотип
CVE-2025-3875

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
redhat логотип
CVE-2025-3875

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2025-3875

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2025-3875

Thunderbird parses addresses in a way that can allow sender spoofing i ...

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-04709

Уязвимость почтового клиента Thunderbird, связанная с некорректной обработкой заголовка p2-from, позволяющая нарушителю проводить спуфинг атаки

CVSS3: 7.5
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:01660-2

Security update for MozillaThunderbird

21 день назад
suse-cvrf логотип
SUSE-SU-2025:01660-1

Security update for MozillaThunderbird

28 дней назад
oracle-oval логотип
ELSA-2025-8203

ELSA-2025-8203: thunderbird security update (IMPORTANT)

24 дня назад
oracle-oval логотип
ELSA-2025-8756

ELSA-2025-8756: thunderbird security update (IMPORTANT)

10 дней назад

Уязвимостей на страницу