Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3391-1 | firefox-esr security update |
Debian DLA |
DLA-3400-1 | thunderbird security update |
Debian DSA |
DSA-5385-1 | firefox-esr security update |
Debian DSA |
DSA-5392-1 | thunderbird security update |
EUVD |
EUVD-2023-33081 | When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. |
Ubuntu USN |
USN-6010-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-6015-1 | Thunderbird vulnerabilities |
Thu, 09 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-01-09T15:44:00.471Z
Reserved: 2023-04-07T00:00:00.000Z
Link: CVE-2023-29539
Updated: 2024-08-02T14:14:38.623Z
Status : Modified
Published: 2023-06-02T17:15:12.607
Modified: 2024-11-21T07:57:15.563
Link: CVE-2023-29539
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN