Количество 11
Количество 11

CVE-2025-5986
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.

CVE-2025-5986
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.

CVE-2025-5986
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.
CVE-2025-5986
A crafted HTML email using mailbox:/// links can trigger automatic, un ...

SUSE-SU-2025:02158-1
Security update for MozillaThunderbird
GHSA-q7fj-77gc-45xq
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.
ELSA-2025-10246
ELSA-2025-10246: thunderbird security update (IMPORTANT)
ELSA-2025-10196
ELSA-2025-10196: thunderbird security update (IMPORTANT)
ELSA-2025-10195
ELSA-2025-10195: thunderbird security update (IMPORTANT)

BDU:2025-08579
Уязвимость почтового клиента Thunderbird, связанная с недостаточной проверкой входных данных, позволяющая нарушителю получить доступ к потенциально конфиденциальной информации

ROS-20250703-08
Множественные уязвимости Thunderbird
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-5986 A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2. | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад |
![]() | CVE-2025-5986 A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2. | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад |
![]() | CVE-2025-5986 A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2. | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад |
CVE-2025-5986 A crafted HTML email using mailbox:/// links can trigger automatic, un ... | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад | |
![]() | SUSE-SU-2025:02158-1 Security update for MozillaThunderbird | 0% Низкий | около 1 месяца назад | |
GHSA-q7fj-77gc-45xq A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2. | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад | |
ELSA-2025-10246 ELSA-2025-10246: thunderbird security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-10196 ELSA-2025-10196: thunderbird security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-10195 ELSA-2025-10195: thunderbird security update (IMPORTANT) | около 1 месяца назад | |||
![]() | BDU:2025-08579 Уязвимость почтового клиента Thunderbird, связанная с недостаточной проверкой входных данных, позволяющая нарушителю получить доступ к потенциально конфиденциальной информации | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад |
![]() | ROS-20250703-08 Множественные уязвимости Thunderbird | CVSS3: 7.5 | около 1 месяца назад |
Уязвимостей на страницу