Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mozilla | Firefox | 138 ~ * | - | |
| Mozilla | Thunderbird | 138 ~ * | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-4093 | Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 | |
| CVE-2025-4092 | Memory safety bugs fixed in Firefox 138 and Thunderbird 138 | |
| CVE-2025-4091 | Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderb | |
| CVE-2025-4089 | Potential local code execution in "copy as cURL" command | |
| CVE-2025-4088 | Cross-site request forgery via storage access API redirects | |
| CVE-2025-4087 | Unsafe attribute access during XPath parsing | |
| CVE-2025-4086 | Specially crafted filename could be used to obscure download type | |
| CVE-2025-4085 | Potential information leakage and privilege escalation in UITour actor | |
| CVE-2025-4084 | Potential local code execution in "copy as cURL" command | |
| CVE-2025-4083 | Process isolation bypass using "javascript:" URI links in cross-origin frames | |
| CVE-2025-4082 | WebGL shader attribute memory corruption in Thunderbird for macOS | |
| CVE-2025-2817 | Privilege escalation in Thunderbird Updater |
No comments yet