Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-55032 (GCVE-0-2025-55032)
Vulnerability from cvelistv5 – Published: 2025-08-19 20:52 – Updated: 2026-04-13 14:28- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Focus for iOS |
Unaffected:
142 , ≤ *
(rpm)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-55032",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-20T14:00:59.308632Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-601",
"description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-20T15:16:57.127Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Focus for iOS",
"vendor": "Mozilla",
"versions": [
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "142",
"versionType": "rpm"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Renwa"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks. This vulnerability was fixed in Focus for iOS 142."
}
],
"value": "Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks. This vulnerability was fixed in Focus for iOS 142."
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T14:28:57.497Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1976296"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-69/"
}
],
"title": "Focus incorrectly ignores Content-Disposition headers for some MIME types"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2025-55032",
"datePublished": "2025-08-19T20:52:50.397Z",
"dateReserved": "2025-08-05T13:26:34.686Z",
"dateUpdated": "2026-04-13T14:28:57.497Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-55032",
"date": "2026-05-16",
"epss": "0.00044",
"percentile": "0.13517"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-55032\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2025-08-19T21:15:28.470\",\"lastModified\":\"2026-04-13T15:17:03.020\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks. This vulnerability was fixed in Focus for iOS 142.\"},{\"lang\":\"es\",\"value\":\"Focus para iOS no respetar\u00eda un encabezado Content-Disposition de tipo Attachment y mostrar\u00eda incorrectamente el contenido en l\u00ednea, lo que potencialmente permitir\u00eda ataques XSS. Esta vulnerabilidad afecta a Focus para iOS \u0026lt; 142.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"142.0\",\"matchCriteriaId\":\"667BB2C7-17E5-4D04-AA9A-1CBE726492AF\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1976296\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2025-69/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-55032\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-20T14:00:59.308632Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-601\", \"description\": \"CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-20T14:01:03.388Z\"}}], \"cna\": {\"title\": \"Focus incorrectly ignores Content-Disposition headers for some MIME types\", \"credits\": [{\"lang\": \"en\", \"value\": \"Renwa\"}], \"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Focus for iOS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"142\", \"versionType\": \"rpm\", \"lessThanOrEqual\": \"*\"}]}], \"references\": [{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1976296\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2025-69/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks. This vulnerability was fixed in Focus for iOS 142.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks. This vulnerability was fixed in Focus for iOS 142.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2026-04-13T14:28:57.497Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-55032\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-13T14:28:57.497Z\", \"dateReserved\": \"2025-08-05T13:26:34.686Z\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"datePublished\": \"2025-08-19T20:52:50.397Z\", \"assignerShortName\": \"mozilla\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CNVD-2025-19558
Vulnerability from cnvd - Published: 2025-08-28厂商已发布了漏洞修复程序,请及时关注更新: https://www.mozilla.org/security/advisories/mfsa2025-69/
| Name | Mozilla Focus for iOS <142 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-55032",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-55032"
}
},
"description": "Mozilla Focus for iOS\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4e13\u4e3aiOS\u8bbe\u5907\u8bbe\u8ba1\u7684\u9690\u79c1\u6d4f\u89c8\u5668\u3002\n\nMozilla Focus for iOS 142\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u6b63\u786e\u5904\u7406Content-Disposition\u6807\u5934\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7a83\u53d6\u53d7\u5bb3\u8005\u57fa\u4e8ecookie\u7684\u8eab\u4efd\u9a8c\u8bc1\u51ed\u636e\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.mozilla.org/security/advisories/mfsa2025-69/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-19558",
"openTime": "2025-08-28",
"patchDescription": "Mozilla Focus for iOS\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4e13\u4e3aiOS\u8bbe\u5907\u8bbe\u8ba1\u7684\u9690\u79c1\u6d4f\u89c8\u5668\u3002\r\n\r\nMozilla Focus for iOS 142\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u672a\u6b63\u786e\u5904\u7406Content-Disposition\u6807\u5934\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7a83\u53d6\u53d7\u5bb3\u8005\u57fa\u4e8ecookie\u7684\u8eab\u4efd\u9a8c\u8bc1\u51ed\u636e\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Focus for iOS\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2025-19558\uff09\u7684\u8865\u4e01",
"products": {
"product": "Mozilla Focus for iOS \u003c142"
},
"referenceLink": "https://www.mozilla.org/security/advisories/mfsa2025-69/",
"serverity": "\u4e2d",
"submitTime": "2025-08-26",
"title": "Mozilla Focus for iOS\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2025-19558\uff09"
}
CERTFR-2025-AVI-0714
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 115.27 | ||
| Mozilla | Firefox | Firefox versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 128.14 | ||
| Mozilla | Firefox | Firefox pour iOS versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 128.14 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 140.2 | ||
| Mozilla | Firefox Focus | Firefox Focus pour iOS versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 140.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 115.27",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox Focus pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox Focus",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55031"
},
{
"name": "CVE-2025-55030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55030"
},
{
"name": "CVE-2025-55028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55028"
},
{
"name": "CVE-2025-55032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55032"
},
{
"name": "CVE-2025-55033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55033"
},
{
"name": "CVE-2025-55029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55029"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0714",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Mozilla. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-69",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-69/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-65",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-65/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-67",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-67/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-72",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-72/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-71",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-64",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-64/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-68",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-68/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-66",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-66/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-70",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-70/"
}
]
}
CERTFR-2025-AVI-0714
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 115.27 | ||
| Mozilla | Firefox | Firefox versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 128.14 | ||
| Mozilla | Firefox | Firefox pour iOS versions antérieures à 142 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 128.14 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 140.2 | ||
| Mozilla | Firefox Focus | Firefox Focus pour iOS versions antérieures à 142 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 140.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 115.27",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 128.14",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox Focus pour iOS versions ant\u00e9rieures \u00e0 142",
"product": {
"name": "Firefox Focus",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 140.2",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55031"
},
{
"name": "CVE-2025-55030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55030"
},
{
"name": "CVE-2025-55028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55028"
},
{
"name": "CVE-2025-55032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55032"
},
{
"name": "CVE-2025-55033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55033"
},
{
"name": "CVE-2025-55029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55029"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0714",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Mozilla. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-69",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-69/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-65",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-65/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-67",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-67/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-72",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-72/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-71",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-64",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-64/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-68",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-68/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-66",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-66/"
},
{
"published_at": "2025-08-19",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2025-70",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-70/"
}
]
}
FKIE_CVE-2025-55032
Vulnerability from fkie_nvd - Published: 2025-08-19 21:15 - Updated: 2026-04-13 15:17| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1976296 | Issue Tracking, Permissions Required | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2025-69/ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox_focus | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:iphone_os:*:*",
"matchCriteriaId": "667BB2C7-17E5-4D04-AA9A-1CBE726492AF",
"versionEndExcluding": "142.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks. This vulnerability was fixed in Focus for iOS 142."
},
{
"lang": "es",
"value": "Focus para iOS no respetar\u00eda un encabezado Content-Disposition de tipo Attachment y mostrar\u00eda incorrectamente el contenido en l\u00ednea, lo que potencialmente permitir\u00eda ataques XSS. Esta vulnerabilidad afecta a Focus para iOS \u0026lt; 142."
}
],
"id": "CVE-2025-55032",
"lastModified": "2026-04-13T15:17:03.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-08-19T21:15:28.470",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1976296"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2025-69/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-601"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-4CQW-2V9H-HFQW
Vulnerability from github – Published: 2025-08-19 21:30 – Updated: 2025-08-20 18:30Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks This vulnerability affects Focus for iOS < 142.
{
"affected": [],
"aliases": [
"CVE-2025-55032"
],
"database_specific": {
"cwe_ids": [
"CWE-601"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-19T21:15:28Z",
"severity": "MODERATE"
},
"details": "Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks This vulnerability affects Focus for iOS \u003c 142.",
"id": "GHSA-4cqw-2v9h-hfqw",
"modified": "2025-08-20T18:30:20Z",
"published": "2025-08-19T21:30:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55032"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1976296"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2025-69"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-1866
Vulnerability from csaf_certbund - Published: 2025-08-19 22:00 - Updated: 2025-10-23 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Mozilla Thunderbird <140.2
Mozilla / Thunderbird
|
<140.2 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Mozilla Firefox iOS <142
Mozilla / Firefox
|
iOS <142 | ||
|
Mozilla Thunderbird <128.14
Mozilla / Thunderbird
|
<128.14 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Mozilla Firefox <142
Mozilla / Firefox
|
<142 | ||
|
Mozilla Firefox ESR <115.27
Mozilla / Firefox ESR
|
<115.27 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Mozilla Thunderbird <142
Mozilla / Thunderbird
|
<142 | ||
|
Mozilla Firefox ESR <128.14
Mozilla / Firefox ESR
|
<128.14 | ||
|
Mozilla Firefox ESR <140.2
Mozilla / Firefox ESR
|
<140.2 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Firefox ist ein Open Source Web Browser. \r\nESR ist die Variante mit verl\u00e4ngertem Support.\r\nThunderbird ist ein Open Source E-Mail Client.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um Daten zu manipulieren, um einen Denial of Service Angriff durchzuf\u00fchren, und um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1866 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1866.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1866 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1866"
},
{
"category": "external",
"summary": "MFSA 2025-64 Security Vulnerabilities fixed in Firefox 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-64/"
},
{
"category": "external",
"summary": "MFSA 2025-65 Security Vulnerabilities fixed in Firefox ESR 115.27 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-65/"
},
{
"category": "external",
"summary": "MFSA 2025-66 Security Vulnerabilities fixed in Firefox ESR 128.14 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-66/"
},
{
"category": "external",
"summary": "MFSA 2025-67 Security Vulnerabilities fixed in Firefox ESR 140.2 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-67/"
},
{
"category": "external",
"summary": "MFSA 2025-68 Security Vulnerabilities fixed in Firefox for iOS 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-68/"
},
{
"category": "external",
"summary": "MFSA 2025-69 Security Vulnerabilities fixed in Focus for iOS 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-69/"
},
{
"category": "external",
"summary": "MFSA 2025-70 Security Vulnerabilities fixed in Thunderbird 142 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-70/"
},
{
"category": "external",
"summary": "MFSA 2025-71 Security Vulnerabilities fixed in Thunderbird 128.14 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/"
},
{
"category": "external",
"summary": "MFSA 2025-72 Security Vulnerabilities fixed in Thunderbird 140.2 vom 2025-08-19",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2025-72/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5980 vom 2025-08-20",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00144.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15468-1 vom 2025-08-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZG3O2VY7KOKS72KN6VW4LMQYP2C6RLE/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4277 vom 2025-08-21",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00016.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5984 vom 2025-08-24",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00148.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15473-1 vom 2025-08-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYYOHEMZQQSD7I3AJFGAMV3O3PPYP2MS/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4279 vom 2025-08-24",
"url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00018.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14416 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14416"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14417 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14417"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14442 vom 2025-08-25",
"url": "https://access.redhat.com/errata/RHSA-2025:14442"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14442 vom 2025-08-25",
"url": "http://linux.oracle.com/errata/ELSA-2025-14442.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14417 vom 2025-08-25",
"url": "http://linux.oracle.com/errata/ELSA-2025-14417.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14416 vom 2025-08-25",
"url": "http://linux.oracle.com/errata/ELSA-2025-14416.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14417 vom 2025-08-25",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018441.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14416 vom 2025-08-25",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018440.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14442 vom 2025-08-25",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018439.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14442 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14442.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14417 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14417.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14416 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14416.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14640 vom 2025-08-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-14640.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14640 vom 2025-08-26",
"url": "https://access.redhat.com/errata/RHSA-2025:14640"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15494-1 vom 2025-08-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MUZIBC4POKRK2EXTWCYJLIOWNRUCVZWB/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14743 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14743"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14743 vom 2025-08-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-14743.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14844 vom 2025-08-28",
"url": "https://access.redhat.com/errata/RHSA-2025:14844"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14844 vom 2025-08-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-14844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03008-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022324.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03007-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022325.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03009-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022323.html"
},
{
"category": "external",
"summary": "IGEL Security Notice ISN-2025-36 vom 2025-09-02",
"url": "https://kb.igel.com/en/security-safety/current/isn-2025-36-firefox-esr-vulnerabilities"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15516-1 vom 2025-09-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZRE3ULYOGDPHMRU7V6J57DV2D23T6LW/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15421 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15421"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15423 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15423"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15438 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15438"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15437 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15437"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15436 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15435 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15435"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15434 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15434"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15430 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15430"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15419 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15419"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15420 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15420"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15422 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15424 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15424"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15418 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15418"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14442 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14442"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14743 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14743"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15496 vom 2025-09-08",
"url": "https://access.redhat.com/errata/RHSA-2025:15496"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15535 vom 2025-09-09",
"url": "https://access.redhat.com/errata/RHSA-2025:15535"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2999 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2999.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2FIREFOX-2025-042 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2FIREFOX-2025-042.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15430 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-15430.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3760-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022988.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3759-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022989.html"
}
],
"source_lang": "en-US",
"title": "Mozilla Firefox und Thunderbird: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:35:25.109+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1866",
"initial_release_date": "2025-08-19T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-08-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE und Debian aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian, openSUSE und Red Hat aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IGEL aufgenommen"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "15",
"summary": "Referenz(en) aufgenommen: RLSA-2025:14416"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "16"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "IGEL OS",
"product": {
"name": "IGEL OS",
"product_id": "T017865",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:-"
}
}
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c142",
"product": {
"name": "Mozilla Firefox \u003c142",
"product_id": "T046352"
}
},
{
"category": "product_version",
"name": "142",
"product": {
"name": "Mozilla Firefox 142",
"product_id": "T046352-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:142"
}
}
},
{
"category": "product_version_range",
"name": "iOS \u003c142",
"product": {
"name": "Mozilla Firefox iOS \u003c142",
"product_id": "T046358"
}
},
{
"category": "product_version",
"name": "iOS 142",
"product": {
"name": "Mozilla Firefox iOS 142",
"product_id": "T046358-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:ios__142"
}
}
}
],
"category": "product_name",
"name": "Firefox"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c115.27",
"product": {
"name": "Mozilla Firefox ESR \u003c115.27",
"product_id": "T046353"
}
},
{
"category": "product_version",
"name": "115.27",
"product": {
"name": "Mozilla Firefox ESR 115.27",
"product_id": "T046353-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:115.27"
}
}
},
{
"category": "product_version_range",
"name": "\u003c128.14",
"product": {
"name": "Mozilla Firefox ESR \u003c128.14",
"product_id": "T046354"
}
},
{
"category": "product_version",
"name": "128.14",
"product": {
"name": "Mozilla Firefox ESR 128.14",
"product_id": "T046354-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:128.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c140.2",
"product": {
"name": "Mozilla Firefox ESR \u003c140.2",
"product_id": "T046355"
}
},
{
"category": "product_version",
"name": "140.2",
"product": {
"name": "Mozilla Firefox ESR 140.2",
"product_id": "T046355-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:140.2"
}
}
}
],
"category": "product_name",
"name": "Firefox ESR"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c142",
"product": {
"name": "Mozilla Thunderbird \u003c142",
"product_id": "T046357"
}
},
{
"category": "product_version",
"name": "142",
"product": {
"name": "Mozilla Thunderbird 142",
"product_id": "T046357-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:142"
}
}
},
{
"category": "product_version_range",
"name": "\u003c128.14",
"product": {
"name": "Mozilla Thunderbird \u003c128.14",
"product_id": "T046359"
}
},
{
"category": "product_version",
"name": "128.14",
"product": {
"name": "Mozilla Thunderbird 128.14",
"product_id": "T046359-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:128.14"
}
}
},
{
"category": "product_version_range",
"name": "\u003c140.2",
"product": {
"name": "Mozilla Thunderbird \u003c140.2",
"product_id": "T046360"
}
},
{
"category": "product_version",
"name": "140.2",
"product": {
"name": "Mozilla Thunderbird 140.2",
"product_id": "T046360-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:140.2"
}
}
}
],
"category": "product_name",
"name": "Thunderbird"
}
],
"category": "vendor",
"name": "Mozilla"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55028",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55028"
},
{
"cve": "CVE-2025-55029",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55029"
},
{
"cve": "CVE-2025-55030",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55030"
},
{
"cve": "CVE-2025-55031",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55031"
},
{
"cve": "CVE-2025-55032",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55032"
},
{
"cve": "CVE-2025-55033",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-55033"
},
{
"cve": "CVE-2025-9179",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9179"
},
{
"cve": "CVE-2025-9180",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9180"
},
{
"cve": "CVE-2025-9181",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9181"
},
{
"cve": "CVE-2025-9182",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9182"
},
{
"cve": "CVE-2025-9183",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9183"
},
{
"cve": "CVE-2025-9184",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9184"
},
{
"cve": "CVE-2025-9185",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9185"
},
{
"cve": "CVE-2025-9186",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9186"
},
{
"cve": "CVE-2025-9187",
"product_status": {
"known_affected": [
"67646",
"T046360",
"T004914",
"T032255",
"T046358",
"T046359",
"2951",
"T002207",
"T017865",
"T027843",
"T046352",
"T046353",
"398363",
"T046357",
"T046354",
"T046355"
]
},
"release_date": "2025-08-19T22:00:00.000+00:00",
"title": "CVE-2025-9187"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.