Kaspersky ID:
KLA91058
Detekováno:
05/19/2026
Aktualizováno:
05/20/2026

Popis

Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Denial of service vulnerability in the Audio/Video: Web Codecs component can be exploited remotely to cause denial of service.
  2. A remote code execution vulnerability in the DOM: Bindings (WebIDL) component can be exploited remotely to execute arbitrary code.
  3. Security vulnerability in the DOM: Networking component can be exploited to bypass security restrictions.
  4. A remote code execution vulnerability in the Widget: Win32 component can be exploited remotely to execute arbitrary code.
  5. Security vulnerability in the Networking: HTTP component can be exploited to bypass security restrictions.
  6. Security vulnerability in the Application Update component can be exploited to bypass security restrictions.
  7. A remote code execution vulnerability in the Disability Access APIs component can be exploited remotely to execute arbitrary code.
  8. A remote code execution vulnerability in the Audio/Video component can be exploited remotely to execute arbitrary code.
  9. Security vulnerability in the DOM: Workers component can be exploited to bypass security restrictions.
  10. A remote code execution vulnerability in the Networking: JAR component can be exploited remotely to execute arbitrary code.
  11. Security vulnerability in the Enterprise Policies component can be exploited to bypass security restrictions.
  12. Security vulnerability in the Security: Process Sandboxing component can be exploited to bypass security restrictions.
  13. Denial of service vulnerability in the Widget: Win32 component can be exploited remotely to cause denial of service.
  14. Security UI vulnerability in WebExtensions can be exploited to spoof user interface.
  15. Security UI vulnerability in the Form Autofill component can be exploited to spoof user interface.
  16. Security vulnerability in the DOM: Security component can be exploited to bypass security restrictions.
  17. Security UI vulnerability in the Web Speech component can be exploited to spoof user interface.
  18. Security UI vulnerability in the Popup Blocker component can be exploited to spoof user interface.
  19. Information disclosure vulnerability in the DOM: Security component can be exploited to obtain sensitive information.
  20. Information disclosure vulnerability in the IP Protection component can be exploited to obtain sensitive information.
  21. Information disclosure vulnerability in the Graphics: WebGPU component can be exploited to obtain sensitive information.
  22. Security vulnerability in the Security component can be exploited to bypass security restrictions.
  23. Security vulnerability in the Networking: JAR component can be exploited to bypass security restrictions.
  24. Security vulnerability in the WebRTC: Audio/Video component can be exploited to bypass security restrictions.
  25. A remote code execution vulnerability in Thunderbird 151 can be exploited remotely to execute arbitrary code.
  26. A remote code execution vulnerability in Thunderbird 140 can be exploited remotely to execute arbitrary code.

Oficiální doporučení

Související produkty

seznam CVE

  • CVE-2026-8946
    critical
  • CVE-2026-8947
    high
  • CVE-2026-8948
    critical
  • CVE-2026-8949
    critical
  • CVE-2026-8950
    critical
  • CVE-2026-8952
    high
  • CVE-2026-8953
    critical
  • CVE-2026-8954
    critical
  • CVE-2026-8955
    high
  • CVE-2026-8956
    critical
  • CVE-2026-8957
    high
  • CVE-2026-8958
    critical
  • CVE-2026-8959
    critical
  • CVE-2026-8960
    critical
  • CVE-2026-8961
    unknown
  • CVE-2026-8962
    unknown
  • CVE-2026-8963
    critical
  • CVE-2026-8964
    critical
  • CVE-2026-8965
    unknown
  • CVE-2026-8966
    unknown
  • CVE-2026-8967
    unknown
  • CVE-2026-8968
    critical
  • CVE-2026-8969
    critical
  • CVE-2026-8970
    high
  • CVE-2026-8971
    high
  • CVE-2026-8972
    high
  • CVE-2026-8973
    critical
  • CVE-2026-8974
    critical
  • CVE-2026-8975
    critical

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.