ALT-PU-2025-5089-3
Closed vulnerabilities
Modified: 2025-04-01
BDU:2025-03530
Уязвимость механизма межпроцессорного взаимодействия (IPC) браузера Mozilla Firefox, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить произвольный код
Modified: 2026-03-04
BDU:2025-04334
Уязвимость браузера Mozilla Firefox, связанная с недостаточной защитой служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2026-03-04
BDU:2025-04985
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2026-03-04
BDU:2025-04986
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
Modified: 2026-03-04
BDU:2025-05195
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2026-03-04
BDU:2025-07527
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с утечкой файлового дескриптора, позволяющая нарушителю повысить свои привилегии
Modified: 2026-03-04
BDU:2025-07528
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2025-10-02
BDU:2025-08235
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2026-03-04
BDU:2025-10504
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
Modified: 2026-04-13
CVE-2025-2857
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.
Modified: 2026-04-13
CVE-2025-3028
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability was fixed in Firefox 137, Firefox ESR 115.22, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1941002
- https://www.mozilla.org/security/advisories/mfsa2025-20/
- https://www.mozilla.org/security/advisories/mfsa2025-21/
- https://www.mozilla.org/security/advisories/mfsa2025-22/
- https://www.mozilla.org/security/advisories/mfsa2025-23/
- https://www.mozilla.org/security/advisories/mfsa2025-24/
- https://lists.debian.org/debian-lts-announce/2025/04/msg00005.html
Modified: 2026-04-13
CVE-2025-3029
A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability was fixed in Firefox 137, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1952213
- https://www.mozilla.org/security/advisories/mfsa2025-20/
- https://www.mozilla.org/security/advisories/mfsa2025-22/
- https://www.mozilla.org/security/advisories/mfsa2025-23/
- https://www.mozilla.org/security/advisories/mfsa2025-24/
- https://lists.debian.org/debian-lts-announce/2025/04/msg00005.html
Modified: 2026-04-13
CVE-2025-3030
Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 137, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1850615%2C1932468%2C1942551%2C1951017%2C1951494
- https://www.mozilla.org/security/advisories/mfsa2025-20/
- https://www.mozilla.org/security/advisories/mfsa2025-22/
- https://www.mozilla.org/security/advisories/mfsa2025-23/
- https://www.mozilla.org/security/advisories/mfsa2025-24/
- https://lists.debian.org/debian-lts-announce/2025/04/msg00005.html
Modified: 2026-04-13
CVE-2025-3031
An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function. This vulnerability was fixed in Firefox 137 and Thunderbird 137.
Modified: 2026-04-13
CVE-2025-3032
Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks. This vulnerability was fixed in Firefox 137 and Thunderbird 137.
Modified: 2026-04-13
CVE-2025-3033
After selecting a malicious Windows `.url` shortcut from the local filesystem, an unexpected file could be uploaded. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 137 and Thunderbird 137.
Modified: 2026-04-13
CVE-2025-3034
Memory safety bugs present in Firefox 136 and Thunderbird 136. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 137 and Thunderbird 137.
Modified: 2026-04-13
CVE-2025-3035
By first using the AI chatbot in one tab and later activating it in another tab, the document title of the previous tab would leak into the chat prompt. This vulnerability was fixed in Firefox 137.
