Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mozilla | Thunderbird | 128.7 ~ 128.* | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript | https://github.com/r3m0t3nu11/CVE-2025-1015 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-1020 | Memory safety bugs fixed in Firefox 135 and Thunderbird 135 | |
| CVE-2025-1016 | Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR | |
| CVE-2025-1017 | Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbi | |
| CVE-2025-0510 | Address of e-mail sender can be spoofed by malicious email | |
| CVE-2025-1014 | Certificate length was not properly checked | |
| CVE-2025-1019 | Fullscreen notification not properly displayed | |
| CVE-2025-1013 | Potential opening of private browsing tabs in normal browsing windows | |
| CVE-2025-1012 | Use-after-free during concurrent delazification | |
| CVE-2025-1018 | Fullscreen notification is not displayed when fullscreen is re-requested | |
| CVE-2025-1011 | A bug in WebAssembly code generation could result in a crash | |
| CVE-2025-1009 | Use-after-free in XSLT | |
| CVE-2025-1010 | Use-after-free in Custom Highlight |
No comments yet