Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (5)
| Vulnerability |
Summary |
Aliases |
|
VCID-g5yf-hp8r-rkcs
|
A crafted HTML email using mailbox:/// links can trigger automatic,
unsolicited downloads of .pdf files to the user's desktop or home
directory without prompting, even if auto-saving is disabled. This
behavior can be abused to fill the disk with garbage data (e.g. using
/dev/urandom on Linux) or to leak Windows credentials via SMB links
when the email is viewed in HTML mode. While user interaction is
required to download the .pdf file, visual obfuscation can conceal
the download trigger. Viewing the email in HTML mode is enough to
load external content.
|
CVE-2025-5986
|
|
VCID-j6w1-yhc3-uqfw
|
An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles.
|
CVE-2025-6425
|
|
VCID-mrb2-hz9y-4ufp
|
When a file download is specified via the Content-Disposition header, that directive would be ignored if the file was included via a <embed> or <object> tag, potentially making a website vulnerable to a cross-site scripting attack.
|
CVE-2025-6430
|
|
VCID-r29z-4m4j-8kft
|
A use-after-free in FontFaceSet resulted in a potentially exploitable crash.
|
CVE-2025-6424
|
|
VCID-s89g-7f5f-5qd2
|
Thunderbird could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an embed tag. This could have bypassed website security checks that restricted which domains users were allowed to embed.
|
CVE-2025-6429
|