Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-4082
PUBLISHED
More InfoOfficial Page
Assigner-mozilla
Assigner Org ID-f16b083a-5664-49f3-a51e-8d479e5ed7fe
View Known Exploited Vulnerability (KEV) details
Published At-29 Apr, 2025 | 13:13
Updated At-13 Apr, 2026 | 14:27
Rejected At-
▼CVE Numbering Authority (CNA)
WebGL shader attribute memory corruption in Thunderbird for macOS

Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges. *This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.*. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.

Affected Products
Vendor
Mozilla CorporationMozilla
Product
Firefox
Versions
Unaffected
  • From 115.23 through 115.* (rpm)
  • From 128.10 through 128.* (rpm)
  • From 138 through * (rpm)
Vendor
Mozilla CorporationMozilla
Product
Thunderbird
Versions
Unaffected
  • From 128.10 through 128.* (rpm)
  • From 138 through * (rpm)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

un3xploitable & GF
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://bugzilla.mozilla.org/show_bug.cgi?id=1937097
N/A
https://www.mozilla.org/security/advisories/mfsa2025-28/
N/A
https://www.mozilla.org/security/advisories/mfsa2025-29/
N/A
https://www.mozilla.org/security/advisories/mfsa2025-30/
N/A
https://www.mozilla.org/security/advisories/mfsa2025-31/
N/A
https://www.mozilla.org/security/advisories/mfsa2025-32/
N/A
Hyperlink: https://bugzilla.mozilla.org/show_bug.cgi?id=1937097
Resource: N/A
Hyperlink: https://www.mozilla.org/security/advisories/mfsa2025-28/
Resource: N/A
Hyperlink: https://www.mozilla.org/security/advisories/mfsa2025-29/
Resource: N/A
Hyperlink: https://www.mozilla.org/security/advisories/mfsa2025-30/
Resource: N/A
Hyperlink: https://www.mozilla.org/security/advisories/mfsa2025-31/
Resource: N/A
Hyperlink: https://www.mozilla.org/security/advisories/mfsa2025-32/
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-125CWE-125 Out-of-bounds Read
Type: CWE
CWE ID: CWE-125
Description: CWE-125 Out-of-bounds Read
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00022.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00022.html
Resource: N/A
Details not found