{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T17:53:14.117","vulnerabilities":[{"cve":{"id":"CVE-2023-50762","sourceIdentifier":"security@mozilla.org","published":"2023-12-19T14:15:07.093","lastModified":"2024-11-21T08:37:15.787","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6."},{"lang":"es","value":"Al procesar un payload PGP/MIME que contiene texto firmado digitalmente, el primer párrafo del texto nunca se mostró al usuario. Esto se debe a que el texto se interpretó como un mensaje MIME y el primer párrafo siempre se trató como una sección de encabezado de correo electrónico. Un texto firmado digitalmente de un contexto diferente, como un commit GIT firmada, podría usarse para falsificar un mensaje de correo electrónico. Esta vulnerabilidad afecta a Thunderbird &lt; 115.6."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"115.6","matchCriteriaId":"1856451B-B03F-4BF2-AEFE-BF66D82D9E78"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6FEEC2-9F11-4643-8827-749718254FED"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*","matchCriteriaId":"46D69DCC-AE4D-4EA5-861C-D60951444C6C"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1862625","source":"security@mozilla.org","tags":["Issue Tracking","Permissions Required"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","source":"security@mozilla.org"},{"url":"https://www.debian.org/security/2023/dsa-5582","source":"security@mozilla.org","tags":["Third Party Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1862625","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Permissions Required"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.debian.org/security/2023/dsa-5582","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}