Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3319-1 | firefox-esr security update |
Debian DLA |
DLA-3324-1 | thunderbird security update |
Debian DSA |
DSA-5350-1 | firefox-esr security update |
Debian DSA |
DSA-5355-1 | thunderbird security update |
EUVD |
EUVD-2023-29639 | When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
Ubuntu USN |
USN-5880-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-5943-1 | Thunderbird vulnerabilities |
Thu, 09 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-01-09T21:12:17.935Z
Reserved: 2023-02-13T00:00:00.000Z
Link: CVE-2023-25732
Updated: 2024-08-02T11:32:11.641Z
Status : Modified
Published: 2023-06-02T17:15:11.193
Modified: 2025-01-09T21:15:21.253
Link: CVE-2023-25732
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN