Description
Multiple vulnerabilities were found in Mozilla Thunderbird. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in GC can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in DOM can be exploited to bypass security restrictions.
- Use after free vulnerability in IPC can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in Copy & Paste and Drag & Drop can be exploited to spoof user interface.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Denial of service vulnerability can be exploited remotely to cause denial of service.
- Information disclosure vulnerability in Networking for Windows can be exploited to obtain sensitive information.
- Use after free vulnerability in JavaScript Engine can be exploited to cause denial of service or execute arbitrary code.
- Integer overflow vulnerability in Graphics can be exploited to cause denial of service.
- Information disclosure vulnerability in XML can be exploited to obtain sensitive information.
Original advisories
Related products
CVE list
- CVE-2026-0877 critical
- CVE-2026-0878 critical
- CVE-2026-0879 critical
- CVE-2026-0880 critical
- CVE-2026-0881 critical
- CVE-2026-0882 critical
- CVE-2026-0883 high
- CVE-2026-0884 critical
- CVE-2026-0885 high
- CVE-2026-0886 high
- CVE-2026-0887 warning
- CVE-2026-0888 high
- CVE-2026-0889 critical
- CVE-2026-0890 high
- CVE-2026-0891 critical
- CVE-2026-0892 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!