Количество 12
Количество 12
GHSA-pc79-pjx7-pq9h
A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.

CVE-2023-29542
A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.

CVE-2023-29542
A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.

CVE-2023-29542
A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
CVE-2023-29542
A newline in a filename could have been used to bypass the file extens ...

BDU:2023-02690
Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с некорректной обработкой новой строки в имени файла, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольный код

SUSE-SU-2023:1855-1
Security update for MozillaFirefox

SUSE-SU-2023:1819-1
Security update for MozillaFirefox

SUSE-SU-2023:1817-1
Security update for MozillaFirefox

ROS-20230505-02
Множественные уязвимости firefox

ROS-20230505-01
Множественные уязвимости thunderbird

SUSE-SU-2023:2064-1
Security update for MozillaThunderbird
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-pc79-pjx7-pq9h A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10. | CVSS3: 9.8 | 0% Низкий | около 2 лет назад | |
![]() | CVE-2023-29542 A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10. | CVSS3: 9.8 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-29542 A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10. | CVSS3: 6.1 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-29542 A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10. | CVSS3: 9.8 | 0% Низкий | около 2 лет назад |
CVE-2023-29542 A newline in a filename could have been used to bypass the file extens ... | CVSS3: 9.8 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-02690 Уязвимость браузеров Mozilla Firefox, Focus for Android, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с некорректной обработкой новой строки в имени файла, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольный код | CVSS3: 6.3 | 0% Низкий | около 2 лет назад |
![]() | SUSE-SU-2023:1855-1 Security update for MozillaFirefox | около 2 лет назад | ||
![]() | SUSE-SU-2023:1819-1 Security update for MozillaFirefox | около 2 лет назад | ||
![]() | SUSE-SU-2023:1817-1 Security update for MozillaFirefox | около 2 лет назад | ||
![]() | ROS-20230505-02 Множественные уязвимости firefox | CVSS3: 8.8 | около 2 лет назад | |
![]() | ROS-20230505-01 Множественные уязвимости thunderbird | CVSS3: 6.3 | около 2 лет назад | |
![]() | SUSE-SU-2023:2064-1 Security update for MozillaThunderbird | около 2 лет назад |
Уязвимостей на страницу