Metrics
Affected Vendors & Products
Wed, 26 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-158 |
Tue, 25 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Fri, 14 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Els
|
|
CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/o:redhat:rhel_els:7 |
|
Vendors & Products |
Redhat rhel Els
|
Mon, 10 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 |
|
Vendors & Products |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
Fri, 07 Mar 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:8 |
Thu, 06 Mar 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Wed, 05 Mar 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents | |
Weaknesses | CWE-754 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 05 Mar 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8. | jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8. |
References |
|
Tue, 04 Mar 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8. | |
References |
|

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-03-26T16:29:31.244Z
Reserved: 2025-03-04T12:29:40.207Z
Link: CVE-2025-1936

Updated: 2025-03-25T17:55:00.991Z

Status : Awaiting Analysis
Published: 2025-03-04T14:15:38.500
Modified: 2025-03-26T17:15:25.527
Link: CVE-2025-1936
