Descrição
Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, cause denial of service, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability can be exploited remotely to gain privileges.
- Information disclosure vulnerability can be exploited to obtain sensitive information.
- Security vulnerability can be exploited to bypass security restrictions.
- Out of bounds memory read vulnerability in in IMAP parsing can be exploited to cause denial of service.
- Denial of service vulnerability can be exploited remotely to cause denial of service.
- Type confusion vulnerability can be exploited to cause denial of service.
- Out of bounds memory read vulnerability in JIT can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Security vulnerability in WebRTC can be exploited to bypass security restrictions.
- Use after free vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Memory safety vulnerability can be exploited to execute arbitrary code
- Security UI vulnerability in the Privacy: Anti-Tracking can be exploited to spoof user interface.
- Security UI vulnerability can be exploited to spoof user interface.
- An elevation of privilege vulnerability in IPC can be exploited remotely to gain privileges.
Comunicados originais
Exploração
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produtos relacionados
Lista de CVE
- CVE-2025-59375 critical
- CVE-2026-4684 critical
- CVE-2026-4685 critical
- CVE-2026-4686 critical
- CVE-2026-4687 critical
- CVE-2026-4688 critical
- CVE-2026-4689 critical
- CVE-2026-4690 critical
- CVE-2026-4691 critical
- CVE-2026-4692 critical
- CVE-2026-4693 critical
- CVE-2026-4694 critical
- CVE-2026-4695 critical
- CVE-2026-4696 critical
- CVE-2026-4697 critical
- CVE-2026-4698 critical
- CVE-2026-4699 critical
- CVE-2026-4700 critical
- CVE-2026-4701 critical
- CVE-2026-4702 critical
- CVE-2026-4704 critical
- CVE-2026-4705 critical
- CVE-2026-4706 critical
- CVE-2026-4707 critical
- CVE-2026-4708 critical
- CVE-2026-4709 critical
- CVE-2026-4710 critical
- CVE-2026-4711 critical
- CVE-2026-4712 critical
- CVE-2026-4713 critical
- CVE-2026-4714 critical
- CVE-2026-4715 critical
- CVE-2026-4716 critical
- CVE-2026-4717 critical
- CVE-2026-4718 critical
- CVE-2026-4719 critical
- CVE-2026-4720 critical
- CVE-2026-4721 critical
- CVE-2026-4722 critical
- CVE-2026-4723 critical
- CVE-2026-4724 critical
- CVE-2026-4725 critical
- CVE-2026-4726 critical
- CVE-2026-4727 critical
- CVE-2026-4728 high
- CVE-2026-4729 critical
- CVE-2026-3889 high
- CVE-2026-4371 high
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!