Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-27426 (GCVE-0-2025-27426)
Vulnerability from cvelistv5 – Published: 2025-03-04 13:31 – Updated: 2026-04-13 14:29- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Firefox for iOS |
Unaffected:
136 , ≤ *
(rpm)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-27426",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-04T15:31:20.980456Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-601",
"description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-04T15:32:13.097Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firefox for iOS",
"vendor": "Mozilla",
"versions": [
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "136",
"versionType": "rpm"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Renwa"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL. This vulnerability was fixed in Firefox for iOS 136."
}
],
"value": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL. This vulnerability was fixed in Firefox for iOS 136."
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T14:29:03.195Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-13/"
}
],
"title": "Firefox Mobile iOS Full Address Bar Spoof Using Server-Side Redirect to internal error page"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2025-27426",
"datePublished": "2025-03-04T13:31:27.827Z",
"dateReserved": "2025-02-24T20:03:31.187Z",
"dateUpdated": "2026-04-13T14:29:03.195Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-27426",
"date": "2026-05-17",
"epss": "0.00322",
"percentile": "0.55294"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-27426\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2025-03-04T14:15:39.593\",\"lastModified\":\"2026-04-13T15:16:55.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL. This vulnerability was fixed in Firefox for iOS 136.\"},{\"lang\":\"es\",\"value\":\"Sitios web maliciosos que utilicen una redirecci\u00f3n del lado del servidor a una p\u00e1gina de error interno podr\u00edan permitir mostrar una URL falsa para el sitio web. Esta vulnerabilidad afecta a Firefox para iOS \u0026lt; 136.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"136.0\",\"matchCriteriaId\":\"7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5415705-33E5-46D5-8E4D-9EBADC8C5705\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1933079\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2025-13/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-27426\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-04T15:31:20.980456Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-601\", \"description\": \"CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-04T15:32:07.799Z\"}}], \"cna\": {\"title\": \"Firefox Mobile iOS Full Address Bar Spoof Using Server-Side Redirect to internal error page\", \"credits\": [{\"lang\": \"en\", \"value\": \"Renwa\"}], \"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Firefox for iOS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"136\", \"versionType\": \"rpm\", \"lessThanOrEqual\": \"*\"}]}], \"references\": [{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1933079\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2025-13/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL. This vulnerability was fixed in Firefox for iOS 136.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL. This vulnerability was fixed in Firefox for iOS 136.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2026-04-13T14:29:03.195Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-27426\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-13T14:29:03.195Z\", \"dateReserved\": \"2025-02-24T20:03:31.187Z\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"datePublished\": \"2025-03-04T13:31:27.827Z\", \"assignerShortName\": \"mozilla\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-57GW-HCMR-F4G2
Vulnerability from github – Published: 2025-03-04 15:31 – Updated: 2025-03-04 18:33Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS < 136.
{
"affected": [],
"aliases": [
"CVE-2025-27426"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-04T14:15:39Z",
"severity": "MODERATE"
},
"details": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS \u003c 136.",
"id": "GHSA-57gw-hcmr-f4g2",
"modified": "2025-03-04T18:33:42Z",
"published": "2025-03-04T15:31:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27426"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2025-13"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-27426
Vulnerability from fkie_nvd - Published: 2025-03-04 14:15 - Updated: 2026-04-13 15:16| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1933079 | Issue Tracking | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2025-13/ | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C",
"versionEndExcluding": "136.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL. This vulnerability was fixed in Firefox for iOS 136."
},
{
"lang": "es",
"value": "Sitios web maliciosos que utilicen una redirecci\u00f3n del lado del servidor a una p\u00e1gina de error interno podr\u00edan permitir mostrar una URL falsa para el sitio web. Esta vulnerabilidad afecta a Firefox para iOS \u0026lt; 136."
}
],
"id": "CVE-2025-27426",
"lastModified": "2026-04-13T15:16:55.467",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-03-04T14:15:39.593",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2025-13/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-0482
Vulnerability from csaf_certbund - Published: 2025-03-04 23:00 - Updated: 2025-06-02 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Xerox FreeFlow Print Server 9
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:9
|
9 | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— | |
|
Mozilla Thunderbird <136
Mozilla / Thunderbird
|
<136 | ||
|
Mozilla Firefox ESR <128.8
Mozilla / Firefox ESR
|
<128.8 | ||
|
Mozilla Firefox ESR <115.21
Mozilla / Firefox ESR
|
<115.21 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <136
Mozilla / Firefox
|
<136 | ||
|
Mozilla Firefox iOS <136
Mozilla / Firefox
|
iOS <136 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird ESR <128.8
Mozilla / Thunderbird
|
ESR <128.8 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Firefox ist ein Open Source Web Browser.\r\nESR ist die Variante mit verl\u00e4ngertem Support.\r\nThunderbird ist ein Open Source E-Mail Client.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird ausnutzen, um Spoofing-Angriffe durchzuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, erh\u00f6hte Privilegien zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen, Daten zu manipulieren, beliebigen Code auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0482 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0482.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0482 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0482"
},
{
"category": "external",
"summary": "Mozilla Foundation Security Advisory vom 2025-03-04",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-13/"
},
{
"category": "external",
"summary": "Mozilla Foundation Security Advisory vom 2025-03-04",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-14/"
},
{
"category": "external",
"summary": "Mozilla Foundation Security Advisory vom 2025-03-04",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-15/"
},
{
"category": "external",
"summary": "Mozilla Foundation Security Advisory vom 2025-03-04",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-16/"
},
{
"category": "external",
"summary": "Mozilla Foundation Security Advisory vom 2025-03-04",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-17/"
},
{
"category": "external",
"summary": "Mozilla Foundation Security Advisory vom 2025-03-04",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-18/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2359 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:2359"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14852-1 vom 2025-03-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0788-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0783-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5874 vom 2025-03-05",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00036.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2359 vom 2025-03-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-2359.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4078 vom 2025-03-06",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00004.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7334-1 vom 2025-03-06",
"url": "https://ubuntu.com/security/notices/USN-7334-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2452 vom 2025-03-06",
"url": "https://access.redhat.com/errata/RHSA-2025:2452"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2452 vom 2025-03-07",
"url": "https://linux.oracle.com/errata/ELSA-2025-2452.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5876 vom 2025-03-08",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00038.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14853-1 vom 2025-03-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14861-1 vom 2025-03-08",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4081 vom 2025-03-10",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00006.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2480 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2480"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2481 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2481"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2479 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2479"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2485 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2485"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2484 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2484"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2486 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2486"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-0F70BC6306 vom 2025-03-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-0f70bc6306"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-4B50CD66A5 vom 2025-03-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-4b50cd66a5"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-BD6664E83B vom 2025-03-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-bd6664e83b"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2708 vom 2025-03-13",
"url": "https://access.redhat.com/errata/RHSA-2025:2708"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0849-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2699 vom 2025-03-13",
"url": "https://access.redhat.com/errata/RHSA-2025:2699"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2899 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2899"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2900 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2900"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2960 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2960"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2699 vom 2025-03-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-2699.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2899 vom 2025-03-17",
"url": "https://linux.oracle.com/errata/ELSA-2025-2899.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2900 vom 2025-03-17",
"url": "https://linux.oracle.com/errata/ELSA-2025-2900.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2957 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2957"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2958 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:2958"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2959 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:2959"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3009 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:3009"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3036 vom 2025-03-19",
"url": "https://access.redhat.com/errata/RHSA-2025:3036"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3013 vom 2025-03-18",
"url": "https://access.redhat.com/errata/RHSA-2025:3013"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASFIREFOX-2025-036 vom 2025-04-01",
"url": "https://alas.aws.amazon.com/AL2/ALASFIREFOX-2025-036.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2807 vom 2025-04-02",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2807.html"
},
{
"category": "external",
"summary": "IGEL Product Security Information",
"url": "https://kb.igel.com/security-safety/current/isn-2025-09-firefox-esr-vulnerabilities"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202505-03 vom 2025-05-12",
"url": "https://security.gentoo.org/glsa/202505-03"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202505-02 vom 2025-05-12",
"url": "https://security.gentoo.org/glsa/202505-02"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202505-08 vom 2025-05-14",
"url": "https://security.gentoo.org/glsa/202505-08"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-02T22:00:00.000+00:00",
"generator": {
"date": "2025-06-03T09:28:02.426+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0482",
"initial_release_date": "2025-03-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat, openSUSE, SUSE und Debian aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian und openSUSE aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "5",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-03-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-03-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-05-11T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "IGEL OS",
"product": {
"name": "IGEL OS",
"product_id": "T017865",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:-"
}
}
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "iOS \u003c136",
"product": {
"name": "Mozilla Firefox iOS \u003c136",
"product_id": "T041568"
}
},
{
"category": "product_version",
"name": "iOS 136",
"product": {
"name": "Mozilla Firefox iOS 136",
"product_id": "T041568-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:ios__136"
}
}
},
{
"category": "product_version_range",
"name": "\u003c136",
"product": {
"name": "Mozilla Firefox \u003c136",
"product_id": "T041569"
}
},
{
"category": "product_version",
"name": "136",
"product": {
"name": "Mozilla Firefox 136",
"product_id": "T041569-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:136"
}
}
}
],
"category": "product_name",
"name": "Firefox"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c115.21",
"product": {
"name": "Mozilla Firefox ESR \u003c115.21",
"product_id": "T041570"
}
},
{
"category": "product_version",
"name": "115.21",
"product": {
"name": "Mozilla Firefox ESR 115.21",
"product_id": "T041570-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:115.21"
}
}
},
{
"category": "product_version_range",
"name": "\u003c128.8",
"product": {
"name": "Mozilla Firefox ESR \u003c128.8",
"product_id": "T041571"
}
},
{
"category": "product_version",
"name": "128.8",
"product": {
"name": "Mozilla Firefox ESR 128.8",
"product_id": "T041571-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:128.8"
}
}
}
],
"category": "product_name",
"name": "Firefox ESR"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c136",
"product": {
"name": "Mozilla Thunderbird \u003c136",
"product_id": "T041572"
}
},
{
"category": "product_version",
"name": "136",
"product": {
"name": "Mozilla Thunderbird 136",
"product_id": "T041572-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:136"
}
}
},
{
"category": "product_version_range",
"name": "ESR \u003c128.8",
"product": {
"name": "Mozilla Thunderbird ESR \u003c128.8",
"product_id": "T041573"
}
},
{
"category": "product_version",
"name": "ESR 128.8",
"product": {
"name": "Mozilla Thunderbird ESR 128.8",
"product_id": "T041573-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:esr__128.8"
}
}
}
],
"category": "product_name",
"name": "Thunderbird"
}
],
"category": "vendor",
"name": "Mozilla"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-1930",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1930"
},
{
"cve": "CVE-2025-1931",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1931"
},
{
"cve": "CVE-2025-1932",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1932"
},
{
"cve": "CVE-2025-1933",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1933"
},
{
"cve": "CVE-2025-1934",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1934"
},
{
"cve": "CVE-2025-1935",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1935"
},
{
"cve": "CVE-2025-1936",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1936"
},
{
"cve": "CVE-2025-1937",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1937"
},
{
"cve": "CVE-2025-1938",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1938"
},
{
"cve": "CVE-2025-1939",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1939"
},
{
"cve": "CVE-2025-1940",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1940"
},
{
"cve": "CVE-2025-1941",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1941"
},
{
"cve": "CVE-2025-1942",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1942"
},
{
"cve": "CVE-2025-1943",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-1943"
},
{
"cve": "CVE-2025-26695",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-26695"
},
{
"cve": "CVE-2025-26696",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-26696"
},
{
"cve": "CVE-2025-27424",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-27424"
},
{
"cve": "CVE-2025-27425",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-27425"
},
{
"cve": "CVE-2025-27426",
"product_status": {
"known_affected": [
"67646",
"T002977",
"T012167",
"T004914",
"74185",
"T041572",
"T041571",
"T041570",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"T041569",
"T041568",
"398363",
"T041573"
]
},
"release_date": "2025-03-04T23:00:00.000+00:00",
"title": "CVE-2025-27426"
}
]
}
CERTFR-2025-AVI-0176
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox | Firefox iOS versions antérieures à 136 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 115.21 | ||
| Mozilla | Firefox | Firefox versions antérieures à 136 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 128.8 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 136 | ||
| Mozilla | Thunderbird ESR | Thunderbird ESR versions antérieures à 128.8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox iOS versions ant\u00e9rieures \u00e0 136",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 115.21",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 136",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 128.8",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 136",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird ESR versions ant\u00e9rieures \u00e0 128.8",
"product": {
"name": "Thunderbird ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-27425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27425"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2024-9956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9956"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2024-43097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43097"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-27426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27426"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-27424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27424"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0176",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Mozilla. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-15",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-15/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-14",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-14/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-18",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-18/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-17",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-17/"
},
{
"published_at": "2025-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-13",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-13/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-16",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-16/"
}
]
}
CERTFR-2025-AVI-0176
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox | Firefox iOS versions antérieures à 136 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 115.21 | ||
| Mozilla | Firefox | Firefox versions antérieures à 136 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 128.8 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 136 | ||
| Mozilla | Thunderbird ESR | Thunderbird ESR versions antérieures à 128.8 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox iOS versions ant\u00e9rieures \u00e0 136",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 115.21",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 136",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 128.8",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 136",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird ESR versions ant\u00e9rieures \u00e0 128.8",
"product": {
"name": "Thunderbird ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-27425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27425"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2024-9956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9956"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2024-43097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43097"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-27426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27426"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-27424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27424"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0176",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Mozilla. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-15",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-15/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-14",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-14/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-18",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-18/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-17",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-17/"
},
{
"published_at": "2025-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-13",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-13/"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-16",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-16/"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.