rpm package
suse/MozillaThunderbird&distro=SUSE Linux Enterprise Workstation Extension 15 SP7
pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP7
Vulnerabilities (134)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-5986 | Med | 6.5 | < 128.11.1-150200.8.224.1 | 128.11.1-150200.8.224.1 | Jun 11, 2025 | A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/uran | |
| CVE-2025-5269 | Hig | 8.1 | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox ESR 128.11 and Thunderbird 1 | |
| CVE-2025-5268 | Hig | 8.1 | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability | |
| CVE-2025-5267 | Med | 5.4 | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11. | |
| CVE-2025-5266 | Med | 4.3 | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11. | |
| CVE-2025-5265 | Med | 4.8 | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects Firefox for Windows. Other versions of Firefox a | |
| CVE-2025-5264 | Med | 4.8 | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox | |
| CVE-2025-5263 | Med | 4.3 | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11. | |
| CVE-2025-5262 | — | < 128.11.0-150200.8.221.1 | 128.11.0-150200.8.221.1 | May 27, 2025 | A double-free could have occurred in `vpx_codec_enc_init_multi` after a failed allocation when initializing the encoder for WebRTC. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 139 and Thunderbird < 128.11. | ||
| CVE-2025-4919 | Hig | 8.8 | < 128.10.2-150200.8.218.1 | 128.10.2-150200.8.218.1 | May 17, 2025 | An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2. | |
| CVE-2025-4918 | Cri | 9.8 | < 128.10.2-150200.8.218.1 | 128.10.2-150200.8.218.1 | May 17, 2025 | An attacker was able to perform an out-of-bounds read or write on a JavaScript `Promise` object. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2. | |
| CVE-2025-3932 | Med | 6.5 | < 128.10.1-150200.8.215.1 | 128.10.1-150200.8.215.1 | May 14, 2025 | It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent that. Thunderbird has been fixed to no longer allow | |
| CVE-2025-3909 | Hig | 8.1 | < 128.10.1-150200.8.215.1 | 128.10.1-150200.8.215.1 | May 14, 2025 | Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as | |
| CVE-2025-3875 | Hig | 7.5 | < 128.10.1-150200.8.215.1 | 128.10.1-150200.8.215.1 | May 14, 2025 | Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vuln |
- affected < 128.11.1-150200.8.224.1fixed 128.11.1-150200.8.224.1
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/uran
- affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox ESR 128.11 and Thunderbird 1
- affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability
- affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
- affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
- affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects Firefox for Windows. Other versions of Firefox a
- affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox
- affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
- CVE-2025-5262May 27, 2025affected < 128.11.0-150200.8.221.1fixed 128.11.0-150200.8.221.1
A double-free could have occurred in `vpx_codec_enc_init_multi` after a failed allocation when initializing the encoder for WebRTC. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 139 and Thunderbird < 128.11.
- affected < 128.10.2-150200.8.218.1fixed 128.10.2-150200.8.218.1
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2.
- affected < 128.10.2-150200.8.218.1fixed 128.10.2-150200.8.218.1
An attacker was able to perform an out-of-bounds read or write on a JavaScript `Promise` object. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2.
- affected < 128.10.1-150200.8.215.1fixed 128.10.1-150200.8.215.1
It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent that. Thunderbird has been fixed to no longer allow
- affected < 128.10.1-150200.8.215.1fixed 128.10.1-150200.8.215.1
Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as
- affected < 128.10.1-150200.8.215.1fixed 128.10.1-150200.8.215.1
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats spoofed@example.com as the actual address. This vuln
Page 7 of 7