Описание
Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use-after-free vulnerability in Graphics: Canvas2D component can be exploited remotely to execute arbitrary code
 - Sandbox escape vulnerability in Canvas2D component can be exploited remotely to execute arbitrary code
 - Same-origin policy bypass vulnerability in Layout component can be exploited to bypass security restrictions
 - Incorrect boundary vulnerability in the JavaScript: GC component can be exploited remotely to execute arbitrary code
 - Integer overflow vulnerability in SVG component can be exploited remotely to execute arbitrary code
 - Information disclosure vulnerability in the Networking: Cache component can be exploited to obtain sensitive information
 - Memory corruption vulnerability can be exploited remotely to execute arbitrary code
 
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2025-10528 high
 - CVE-2025-10529 high
 - CVE-2025-10532 high
 - CVE-2025-10537 critical
 - CVE-2025-10527 high
 - CVE-2025-10533 critical
 - CVE-2025-10536 high
 
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
                                    Нашли неточность в описании этой уязвимости? Дайте нам знать!