Логотип exploitDog
bind:"CVE-2025-3522"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-3522"

Количество 12

Количество 12

ubuntu логотип

CVE-2025-3522

4 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2025-3522

4 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2025-3522

4 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2025-3522

4 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to ...

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-78fw-w53r-pgwg

4 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2025-06555

4 месяца назад

Уязвимость почтового клиента Thunderbird, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1366-1

4 месяца назад

Security update for MozillaThunderbird

EPSS: Низкий
redos логотип

ROS-20250515-08

3 месяца назад

Множественные уязвимости thunderbird

CVSS3: 6.4
EPSS: Низкий
oracle-oval логотип

ELSA-2025-7435

3 месяца назад

ELSA-2025-7435: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-4649

3 месяца назад

ELSA-2025-4649: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-4229

3 месяца назад

ELSA-2025-4229: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7507

около 1 месяца назад

ELSA-2025-7507: thunderbird security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 7.4
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to ...

CVSS3: 6.3
0%
Низкий
4 месяца назад
github логотип
GHSA-78fw-w53r-pgwg

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-06555

Уязвимость почтового клиента Thunderbird, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

CVSS3: 6.3
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:1366-1

Security update for MozillaThunderbird

4 месяца назад
redos логотип
ROS-20250515-08

Множественные уязвимости thunderbird

CVSS3: 6.4
3 месяца назад
oracle-oval логотип
ELSA-2025-7435

ELSA-2025-7435: thunderbird security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-4649

ELSA-2025-4649: thunderbird security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-4229

ELSA-2025-4229: thunderbird security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-7507

ELSA-2025-7507: thunderbird security update (IMPORTANT)

около 1 месяца назад

Уязвимостей на страницу