Description
Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use-after-free vulnerability in Graphics: Canvas2D component can be exploited remotely to execute arbitrary code
 - Sandbox escape vulnerability in Canvas2D component can be exploited remotely to execute arbitrary code
 - Same-origin policy bypass vulnerability in Layout component can be exploited to bypass security restrictions
 - Incorrect boundary vulnerability in the JavaScript: GC component can be exploited remotely to execute arbitrary code
 - Integer overflow vulnerability in SVG component can be exploited remotely to execute arbitrary code
 - Information disclosure vulnerability in the Networking: Cache component can be exploited to obtain sensitive information
 - Memory corruption vulnerability can be exploited remotely to execute arbitrary code
 
Original advisories
Related products
CVE list
- CVE-2025-10528 high
 - CVE-2025-10529 high
 - CVE-2025-10532 high
 - CVE-2025-10537 critical
 - CVE-2025-10527 high
 - CVE-2025-10533 critical
 - CVE-2025-10536 high
 
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
                                    Found an inaccuracy in the description of this vulnerability? Let us know!