Kaspersky ID:
KLA90956
検出日:
03/24/2026
更新日:
03/30/2026

説明

Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, cause denial of service, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  2. Information disclosure vulnerability can be exploited to obtain sensitive information.
  3. Security vulnerability can be exploited to bypass security restrictions.
  4. Out of bounds memory read vulnerability in in IMAP parsing can be exploited to cause denial of service.
  5. Denial of service vulnerability can be exploited remotely to cause denial of service.
  6. Type confusion vulnerability can be exploited to cause denial of service.
  7. Out of bounds memory read vulnerability in JIT can be exploited to cause denial of service.
  8. Memory safety vulnerability can be exploited to execute arbitrary code.
  9. Security vulnerability in WebRTC can be exploited to bypass security restrictions.
  10. Use after free vulnerability can be exploited to cause denial of service or execute arbitrary code.
  11. Memory safety vulnerability can be exploited to execute arbitrary code
  12. Security UI vulnerability in the Privacy: Anti-Tracking can be exploited to spoof user interface.
  13. Security UI vulnerability can be exploited to spoof user interface.
  14. An elevation of privilege vulnerability in IPC can be exploited remotely to gain privileges.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

関連製品

CVEリスト

  • CVE-2025-59375
    critical
  • CVE-2026-4684
    critical
  • CVE-2026-4685
    critical
  • CVE-2026-4686
    critical
  • CVE-2026-4687
    critical
  • CVE-2026-4688
    critical
  • CVE-2026-4689
    critical
  • CVE-2026-4690
    critical
  • CVE-2026-4691
    critical
  • CVE-2026-4692
    critical
  • CVE-2026-4693
    critical
  • CVE-2026-4694
    critical
  • CVE-2026-4695
    critical
  • CVE-2026-4696
    critical
  • CVE-2026-4697
    critical
  • CVE-2026-4698
    critical
  • CVE-2026-4699
    critical
  • CVE-2026-4700
    critical
  • CVE-2026-4701
    critical
  • CVE-2026-4702
    critical
  • CVE-2026-4704
    critical
  • CVE-2026-4705
    critical
  • CVE-2026-4706
    critical
  • CVE-2026-4707
    critical
  • CVE-2026-4708
    critical
  • CVE-2026-4709
    critical
  • CVE-2026-4710
    critical
  • CVE-2026-4711
    critical
  • CVE-2026-4712
    critical
  • CVE-2026-4713
    critical
  • CVE-2026-4714
    critical
  • CVE-2026-4715
    critical
  • CVE-2026-4716
    critical
  • CVE-2026-4717
    critical
  • CVE-2026-4718
    critical
  • CVE-2026-4719
    critical
  • CVE-2026-4720
    critical
  • CVE-2026-4721
    critical
  • CVE-2026-4722
    critical
  • CVE-2026-4723
    critical
  • CVE-2026-4724
    critical
  • CVE-2026-4725
    critical
  • CVE-2026-4726
    critical
  • CVE-2026-4727
    critical
  • CVE-2026-4728
    high
  • CVE-2026-4729
    critical
  • CVE-2026-3889
    high
  • CVE-2026-4371
    high

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.