6.5 CVE-2025-9181
Uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 142, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.
https://nvd.nist.gov/vuln/detail/CVE-2025-9181
Categories
CWE-457 : Use of Uninitialized Variable
In some languages such as C and C++, stack variables are not initialized by default. They generally contain junk data with the contents of stack memory before the function was invoked. An attacker can sometimes control or read these contents. In other languages or conditions, a variable that is not explicitly initialized can be given a default value that has security implications, depending on the logic of the program. The presence of an uninitialized variable can sometimes indicate a typographic error in the code.
References
security@mozilla.org
https://bugzilla.mozilla.org/show_bug.cgi?id=1977130 Issue Tracking Permissions Required |
https://www.mozilla.org/security/advisories/mfsa2025-64/ Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-66/ Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-67/ Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-70/ Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-71/ Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-72/ Vendor Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* | < 128.14.0 | |
cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* | < 142.0 | |
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* | >= 140.0 | < 140.2.0 |
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:* | < 128.14.0 | |
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:* | < 142.0 | |
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:* | >= 140.0 | < 140.2.0 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.