Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-55028 (GCVE-0-2025-55028)
Vulnerability from cvelistv5 – Published: 2025-08-19 20:52 – Updated: 2026-04-13 14:31- CWE-400 - Uncontrolled Resource Consumption
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Firefox for iOS |
Unaffected:
142 , ≤ *
(rpm)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-55028",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-20T14:01:54.612039Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T15:17:20.670Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firefox for iOS",
"vendor": "Mozilla",
"versions": [
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "142",
"versionType": "rpm"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Antoine Morin"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks. This vulnerability was fixed in Firefox for iOS 142."
}
],
"value": "Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks. This vulnerability was fixed in Firefox for iOS 142."
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T14:31:51.918Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1850240"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-68/"
}
],
"title": "JavaScript alerts could impede UI interaction or allow denial of service attacks"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2025-55028",
"datePublished": "2025-08-19T20:52:49.372Z",
"dateReserved": "2025-08-05T13:26:34.685Z",
"dateUpdated": "2026-04-13T14:31:51.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-55028",
"date": "2026-05-17",
"epss": "0.0007",
"percentile": "0.21301"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-55028\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2025-08-19T21:15:27.973\",\"lastModified\":\"2026-04-13T15:17:02.333\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks. This vulnerability was fixed in Firefox for iOS 142.\"},{\"lang\":\"es\",\"value\":\"Los scripts maliciosos que utilizan alertas JavaScript repetitivas podr\u00edan impedir la interacci\u00f3n del usuario del cliente en algunos escenarios y permitir ataques de denegaci\u00f3n de servicio. Esta vulnerabilidad afecta a Firefox para iOS \u0026lt; 142.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"142.0\",\"matchCriteriaId\":\"7EE372C2-99CB-45F5-9F6B-0862D02C6374\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1850240\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2025-68/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-55028\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-20T14:01:54.612039Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-20T14:02:00.576Z\"}}], \"cna\": {\"title\": \"JavaScript alerts could impede UI interaction or allow denial of service attacks\", \"credits\": [{\"lang\": \"en\", \"value\": \"Antoine Morin\"}], \"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Firefox for iOS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"142\", \"versionType\": \"rpm\", \"lessThanOrEqual\": \"*\"}]}], \"references\": [{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1850240\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2025-68/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks. This vulnerability was fixed in Firefox for iOS 142.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks. This vulnerability was fixed in Firefox for iOS 142.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2026-04-13T14:31:51.918Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-55028\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-13T14:31:51.918Z\", \"dateReserved\": \"2025-08-05T13:26:34.685Z\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"datePublished\": \"2025-08-19T20:52:49.372Z\", \"assignerShortName\": \"mozilla\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0714
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 115.27 | ||
| Mozilla | Firefox | Firefox versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 128.14 | ||
| Mozilla | Firefox | Firefox pour iOS versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 128.14 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 140.2 | ||
| Mozilla | Firefox Focus | Firefox Focus pour iOS versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 140.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 115.27",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox Focus pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox Focus",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55031"
},
{
"name": "CVE-2025-55030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55030"
},
{
"name": "CVE-2025-55028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55028"
},
{
"name": "CVE-2025-55032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55032"
},
{
"name": "CVE-2025-55033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55033"
},
{
"name": "CVE-2025-55029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55029"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0714",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Mozilla. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-69",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-69/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-65",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-65/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-67",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-67/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-72",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-72/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-71",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-64",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-64/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-68",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-68/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-66",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-66/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-70",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-70/"
}
]
}
CERTFR-2025-AVI-0714
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 115.27 | ||
| Mozilla | Firefox | Firefox versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 128.14 | ||
| Mozilla | Firefox | Firefox pour iOS versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 128.14 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 140.2 | ||
| Mozilla | Firefox Focus | Firefox Focus pour iOS versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 140.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 115.27",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox Focus pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox Focus",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55031"
},
{
"name": "CVE-2025-55030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55030"
},
{
"name": "CVE-2025-55028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55028"
},
{
"name": "CVE-2025-55032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55032"
},
{
"name": "CVE-2025-55033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55033"
},
{
"name": "CVE-2025-55029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55029"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0714",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Mozilla. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-69",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-69/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-65",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-65/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-67",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-67/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-72",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-72/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-71",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-64",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-64/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-68",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-68/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-66",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-66/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-70",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-70/"
}
]
}
GHSA-H3XR-99Q8-227G
Vulnerability from github – Published: 2025-08-19 21:30 – Updated: 2025-08-20 18:30Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks This vulnerability affects Firefox for iOS < 142.
{
"affected": [],
"aliases": [
"CVE-2025-55028"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-19T21:15:27Z",
"severity": "MODERATE"
},
"details": "Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks This vulnerability affects Firefox for iOS \u003c 142.",
"id": "GHSA-h3xr-99q8-227g",
"modified": "2025-08-20T18:30:20Z",
"published": "2025-08-19T21:30:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55028"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1850240"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2025-68"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-55028
Vulnerability from fkie_nvd - Published: 2025-08-19 21:15 - Updated: 2026-04-13 15:17| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1850240 | Issue Tracking, Permissions Required | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2025-68/ | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
"matchCriteriaId": "7EE372C2-99CB-45F5-9F6B-0862D02C6374",
"versionEndExcluding": "142.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks. This vulnerability was fixed in Firefox for iOS 142."
},
{
"lang": "es",
"value": "Los scripts maliciosos que utilizan alertas JavaScript repetitivas podr\u00edan impedir la interacci\u00f3n del usuario del cliente en algunos escenarios y permitir ataques de denegaci\u00f3n de servicio. Esta vulnerabilidad afecta a Firefox para iOS \u0026lt; 142."
}
],
"id": "CVE-2025-55028",
"lastModified": "2026-04-13T15:17:02.333",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-08-19T21:15:27.973",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1850240"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2025-68/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CNVD-2025-19565
Vulnerability from cnvd - Published: 2025-08-28厂商已发布了漏洞修复程序,请及时关注更新: https://www.mozilla.org/security/advisories/mfsa2025-68/
| Name | Mozilla Firefox for iOS <142 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-55028",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-55028"
}
},
"description": "Mozilla Firefox for iOS\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u9488\u5bf9iOS\u8bbe\u5907\u8bbe\u8ba1\u7684\u7f51\u9875\u6d4f\u89c8\u5668\u3002\n\nMozilla Firefox for iOS 142\u4e4b\u524d\u7248\u672c\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.mozilla.org/security/advisories/mfsa2025-68/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-19565",
"openTime": "2025-08-28",
"patchDescription": "Mozilla Firefox for iOS\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u9488\u5bf9iOS\u8bbe\u5907\u8bbe\u8ba1\u7684\u7f51\u9875\u6d4f\u89c8\u5668\u3002\r\n\r\nMozilla Firefox for iOS 142\u4e4b\u524d\u7248\u672c\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox for iOS\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2025-19565\uff09\u7684\u8865\u4e01",
"products": {
"product": "Mozilla Firefox for iOS \u003c142"
},
"referenceLink": "https://www.mozilla.org/security/advisories/mfsa2025-68/",
"serverity": "\u9ad8",
"submitTime": "2025-08-26",
"title": "Mozilla Firefox for iOS\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2025-19565\uff09"
}
WID-SEC-W-2025-1866
Vulnerability from csaf_certbund - Published: 2025-08-19 22:00 - Updated: 2025-10-23 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Firefox ist ein Open Source Web Browser. \r\nESR ist die Variante mit verl\u00e4ngertem Support.\r\nThunderbird ist ein Open Source E-Mail Client.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um Daten zu manipulieren, um einen Denial of Service Angriff durchzuf\u00fchren, und um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1866 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1866.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1866 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1866"
},
{
"category": "external",
"summary": "MFSA 2025-64 Security Vulnerabilities fixed in Firefox 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-64/"
},
{
"category": "external",
"summary": "MFSA 2025-65 Security Vulnerabilities fixed in Firefox ESR 115.27 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-65/"
},
{
"category": "external",
"summary": "MFSA 2025-66 Security Vulnerabilities fixed in Firefox ESR 128.14 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-66/"
},
{
"category": "external",
"summary": "MFSA 2025-67 Security Vulnerabilities fixed in Firefox ESR 140.2 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-67/"
},
{
"category": "external",
"summary": "MFSA 2025-68 Security Vulnerabilities fixed in Firefox for iOS 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-68/"
},
{
"category": "external",
"summary": "MFSA 2025-69 Security Vulnerabilities fixed in Focus for iOS 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-69/"
},
{
"category": "external",
"summary": "MFSA 2025-70 Security Vulnerabilities fixed in Thunderbird 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-70/"
},
{
"category": "external",
"summary": "MFSA 2025-71 Security Vulnerabilities fixed in Thunderbird 128.14 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/"
},
{
"category": "external",
"summary": "MFSA 2025-72 Security Vulnerabilities fixed in Thunderbird 140.2 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-72/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5980 vom 2025-08-20",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00144.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15468-1 vom 2025-08-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZG3O2VY7KOKS72KN6VW4LMQYP2C6RLE/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4277 vom 2025-08-21",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00016.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5984 vom 2025-08-24",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00148.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15473-1 vom 2025-08-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYYOHEMZQQSD7I3AJFGAMV3O3PPYP2MS/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4279 vom 2025-08-24",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00018.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14416 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14416"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14417 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14417"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14442 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14442"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14442 vom 2025-08-25",
"url": "http://linux.oracle.com/errata/ELSA-2025-14442.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14417 vom 2025-08-25",
"url": "http://linux.oracle.com/errata/ELSA-2025-14417.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14416 vom 2025-08-25",
"url": "http://linux.oracle.com/errata/ELSA-2025-14416.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14417 vom 2025-08-25",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018441.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14416 vom 2025-08-25",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018440.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14442 vom 2025-08-25",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018439.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14442 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14442.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14417 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14417.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14416 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14416.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14640 vom 2025-08-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-14640.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14640 vom 2025-08-26",
"url": "https://access.redhat.com/errata/RHSA-2025:14640"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15494-1 vom 2025-08-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MUZIBC4POKRK2EXTWCYJLIOWNRUCVZWB/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14743 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14743"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14743 vom 2025-08-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-14743.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14844 vom 2025-08-28",
"url": "https://access.redhat.com/errata/RHSA-2025:14844"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14844 vom 2025-08-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-14844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03008-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022324.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03007-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022325.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03009-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022323.html"
},
{
"category": "external",
"summary": "IGEL Security Notice ISN-2025-36 vom 2025-09-02",
"url": "https://kb.igel.com/en/security-safety/current/isn-2025-36-firefox-esr-vulnerabilities"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15516-1 vom 2025-09-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZRE3ULYOGDPHMRU7V6J57DV2D23T6LW/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15421 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15421"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15423 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15423"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15438 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15438"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15437 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15437"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15436 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15435 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15435"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15434 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15434"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15430 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15430"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15419 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15419"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15420 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15420"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15422 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15424 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15424"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15418 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15418"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14442 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14442"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14743 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14743"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15496 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15496"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15535 vom 2025-09-09",
"url": "https://access.redhat.com/errata/RHSA-2025:15535"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2999 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2999.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2FIREFOX-2025-042 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2FIREFOX-2025-042.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15430 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-15430.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3760-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022988.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3759-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022989.html"
}
],
"source_lang": "en-US",
"title": "Mozilla Firefox und Thunderbird: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:35:25.109+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1866",
"initial_release_date": "2025-08-19T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE und Debian aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian, openSUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IGEL aufgenommen"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "15",
"summary": "Referenz(en) aufgenommen: RLSA-2025:14416"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "16"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "IGEL OS",
"product": {
"name": "IGEL OS",
"product_id": "T017865",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:-"
}
}
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c142",
"product": {
"name": "Mozilla Firefox \u003c142",
"product_id": "T046352"
}
},
{
"category": "product_version",
"name": "142",
"product": {
"name": "Mozilla Firefox 142",
"product_id": "T046352-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:142"
}
}
},
{
"category": "product_version_range",
"name": "iOS \u003c142",
"product": {
"name": "Mozilla Firefox iOS \u003c142",
"product_id": "T046358"
}
},
{
"category": "product_version",
"name": "iOS 142",
"product": {
"name": "Mozilla Firefox iOS 142",
"product_id": "T046358-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:ios__142"
}
}
}
],
"category": "product_name",
"name": "Firefox"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c115.27",
"product": {
"name": "Mozilla Firefox ESR \u003c115.27",
"product_id": "T046353"
}
},
{
"category": "product_version",
"name": "115.27",
"product": {
"name": "Mozilla Firefox ESR 115.27",
"product_id": "T046353-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:115.27"
}
}
},
{
"category": "product_version_range",
"name": "\u003c128.14",
"product": {
"name": "Mozilla Firefox ESR \u003c128.14",
"product_id": "T046354"
}
},
{
"category": "product_version",
"name": "128.14",
"product": {
"name": "Mozilla Firefox ESR 128.14",
"product_id": "T046354-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:128.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c140.2",
"product": {
"name": "Mozilla Firefox ESR \u003c140.2",
"product_id": "T046355"
}
},
{
"category": "product_version",
"name": "140.2",
"product": {
"name": "Mozilla Firefox ESR 140.2",
"product_id": "T046355-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:140.2"
}
}
}
],
"category": "product_name",
"name": "Firefox ESR"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c142",
"product": {
"name": "Mozilla Thunderbird \u003c142",
"product_id": "T046357"
}
},
{
"category": "product_version",
"name": "142",
"product": {
"name": "Mozilla Thunderbird 142",
"product_id": "T046357-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:142"
}
}
},
{
"category": "product_version_range",
"name": "\u003c128.14",
"product": {
"name": "Mozilla Thunderbird \u003c128.14",
"product_id": "T046359"
}
},
{
"category": "product_version",
"name": "128.14",
"product": {
"name": "Mozilla Thunderbird 128.14",
"product_id": "T046359-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:128.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c140.2",
"product": {
"name": "Mozilla Thunderbird \u003c140.2",
"product_id": "T046360"
}
},
{
"category": "product_version",
"name": "140.2",
"product": {
"name": "Mozilla Thunderbird 140.2",
"product_id": "T046360-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:140.2"
}
}
}
],
"category": "product_name",
"name": "Thunderbird"
}
],
"category": "vendor",
"name": "Mozilla"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55028",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55028"
},
{
"cve": "CVE-2025-55029",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55029"
},
{
"cve": "CVE-2025-55030",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55030"
},
{
"cve": "CVE-2025-55031",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55031"
},
{
"cve": "CVE-2025-55032",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55032"
},
{
"cve": "CVE-2025-55033",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55033"
},
{
"cve": "CVE-2025-9179",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9179"
},
{
"cve": "CVE-2025-9180",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9180"
},
{
"cve": "CVE-2025-9181",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9181"
},
{
"cve": "CVE-2025-9182",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9182"
},
{
"cve": "CVE-2025-9183",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9183"
},
{
"cve": "CVE-2025-9184",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9184"
},
{
"cve": "CVE-2025-9185",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9185"
},
{
"cve": "CVE-2025-9186",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9186"
},
{
"cve": "CVE-2025-9187",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9187"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.