Логотип exploitDog
bind:"CVE-2025-3523" OR bind:"CVE-2025-3522" OR bind:"CVE-2025-2830"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-3523" OR bind:"CVE-2025-3522" OR bind:"CVE-2025-2830"

Количество 25

Количество 25

suse-cvrf логотип

SUSE-SU-2025:1366-1

6 месяцев назад

Security update for MozillaThunderbird

EPSS: Низкий
redos логотип

ROS-20250515-08

6 месяцев назад

Множественные уязвимости thunderbird

CVSS3: 6.4
EPSS: Низкий
rocky логотип

RLSA-2025:7435

3 месяца назад

Important: thunderbird security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7435

6 месяцев назад

ELSA-2025-7435: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-4649

6 месяцев назад

ELSA-2025-4649: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-4229

6 месяцев назад

ELSA-2025-4229: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7507

4 месяца назад

ELSA-2025-7507: thunderbird security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2025-3523

7 месяцев назад

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
EPSS: Низкий
redhat логотип

CVE-2025-3523

7 месяцев назад

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2025-3523

7 месяцев назад

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2025-3523

7 месяцев назад

When an email contains multiple attachments with external links via th ...

CVSS3: 6.4
EPSS: Низкий
github логотип

GHSA-4h7q-pj8m-5675

7 месяцев назад

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
EPSS: Низкий
fstec логотип

BDU:2025-07589

7 месяцев назад

Уязвимость почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг атаки

CVSS3: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2025-3522

7 месяцев назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2025-3522

7 месяцев назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2025-3522

7 месяцев назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2025-3522

7 месяцев назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to ...

CVSS3: 6.3
EPSS: Низкий
ubuntu логотип

CVE-2025-2830

7 месяцев назад

By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2025-2830

7 месяцев назад

By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2025-2830

7 месяцев назад

By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2025:1366-1

Security update for MozillaThunderbird

6 месяцев назад
redos логотип
ROS-20250515-08

Множественные уязвимости thunderbird

CVSS3: 6.4
6 месяцев назад
rocky логотип
RLSA-2025:7435

Important: thunderbird security update

3 месяца назад
oracle-oval логотип
ELSA-2025-7435

ELSA-2025-7435: thunderbird security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-4649

ELSA-2025-4649: thunderbird security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-4229

ELSA-2025-4229: thunderbird security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-7507

ELSA-2025-7507: thunderbird security update (IMPORTANT)

4 месяца назад
ubuntu логотип
CVE-2025-3523

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-3523

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-3523

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-3523

When an email contains multiple attachments with external links via th ...

CVSS3: 6.4
0%
Низкий
7 месяцев назад
github логотип
GHSA-4h7q-pj8m-5675

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.4
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-07589

Уязвимость почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг атаки

CVSS3: 6.4
0%
Низкий
7 месяцев назад
ubuntu логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 7.4
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-3522

Thunderbird processes the X-Mozilla-External-Attachment-URL header to ...

CVSS3: 6.3
0%
Низкий
7 месяцев назад
ubuntu логотип
CVE-2025-2830

By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-2830

By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.1
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-2830

By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
0%
Низкий
7 месяцев назад

Уязвимостей на страницу