diff --git a/2024/7xxx/CVE-2024-7518.json b/2024/7xxx/CVE-2024-7518.json index eed1cbd6b9c..aa0e7df263e 100644 --- a/2024/7xxx/CVE-2024-7518.json +++ b/2024/7xxx/CVE-2024-7518.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1." + "value": "Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -80,6 +92,11 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" } ] }, diff --git a/2024/7xxx/CVE-2024-7519.json b/2024/7xxx/CVE-2024-7519.json index 10af337339b..a9b2b33f092 100644 --- a/2024/7xxx/CVE-2024-7519.json +++ b/2024/7xxx/CVE-2024-7519.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1." + "value": "Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -85,6 +97,16 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-38/" } ] }, diff --git a/2024/7xxx/CVE-2024-7520.json b/2024/7xxx/CVE-2024-7520.json index 672eec3d508..8af5bea1e84 100644 --- a/2024/7xxx/CVE-2024-7520.json +++ b/2024/7xxx/CVE-2024-7520.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1." + "value": "A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -80,6 +92,11 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" } ] }, diff --git a/2024/7xxx/CVE-2024-7521.json b/2024/7xxx/CVE-2024-7521.json index 748e01e79ba..070ae46d86e 100644 --- a/2024/7xxx/CVE-2024-7521.json +++ b/2024/7xxx/CVE-2024-7521.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1." + "value": "Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -85,6 +97,16 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-38/" } ] }, diff --git a/2024/7xxx/CVE-2024-7522.json b/2024/7xxx/CVE-2024-7522.json index 370d04ac960..edb1a3cc4e5 100644 --- a/2024/7xxx/CVE-2024-7522.json +++ b/2024/7xxx/CVE-2024-7522.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1." + "value": "Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -85,6 +97,16 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-38/" } ] }, diff --git a/2024/7xxx/CVE-2024-7525.json b/2024/7xxx/CVE-2024-7525.json index a50b6e031b2..8faefa72f02 100644 --- a/2024/7xxx/CVE-2024-7525.json +++ b/2024/7xxx/CVE-2024-7525.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "It was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1." + "value": "It was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -85,6 +97,16 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-38/" } ] }, diff --git a/2024/7xxx/CVE-2024-7526.json b/2024/7xxx/CVE-2024-7526.json index f97a0874b46..302242c9d96 100644 --- a/2024/7xxx/CVE-2024-7526.json +++ b/2024/7xxx/CVE-2024-7526.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1." + "value": "ANGLE failed to initialize parameters which led to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -85,6 +97,16 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-38/" } ] }, diff --git a/2024/7xxx/CVE-2024-7527.json b/2024/7xxx/CVE-2024-7527.json index ae340c619e0..06382fc9f24 100644 --- a/2024/7xxx/CVE-2024-7527.json +++ b/2024/7xxx/CVE-2024-7527.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Unexpected marking work at the start of sweeping could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1." + "value": "Unexpected marking work at the start of sweeping could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -85,6 +97,16 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-38/" } ] }, diff --git a/2024/7xxx/CVE-2024-7528.json b/2024/7xxx/CVE-2024-7528.json index e3a33decc8f..f0a7b9aee4f 100644 --- a/2024/7xxx/CVE-2024-7528.json +++ b/2024/7xxx/CVE-2024-7528.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129 and Firefox ESR < 128.1." + "value": "Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -80,6 +92,11 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" } ] }, diff --git a/2024/7xxx/CVE-2024-7529.json b/2024/7xxx/CVE-2024-7529.json index 9bb0db62d98..48d9a7547b4 100644 --- a/2024/7xxx/CVE-2024-7529.json +++ b/2024/7xxx/CVE-2024-7529.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1." + "value": "The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, Firefox ESR < 128.1, Thunderbird < 128.1, and Thunderbird < 115.14." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "128.1" + } + ] + } } ] } @@ -85,6 +97,16 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2024-35/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2024-35/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-37/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-37/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-38/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2024-38/" } ] },