Kaspersky ID:
KLA89241
Дата обнаружения:
14/10/2025
Обновлено:
15/10/2025

Описание

Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions, perform cross-site scripting attack.

Below is a complete list of vulnerabilities:

  1. Use-after-free vulnerability in MediaTrackGraph can be exploited remotely to execute arbitrary code and cause denial of service
  2. Out of bounds read/write vulnerability in WebGL can be exploited remotely to execute arbitrary code and cause denial of service
  3. Security bypass vulnerability in privileged browser process can be exploited to bypass security restrictions and obtain sensitive information
  4. Security bypass vulnerability in JavaScript can be exploited to modify non-writable properties and bypass security restrictions
  5. Cross site scripting vulnerability due to improper MIME-type enforcement in OBJECT tag can be exploited remotely to execute arbitrary code
  6. Insufficient escaping in the “Copy as cURL” feature vulnerability can be exploited remotely to execute arbitrary code
  7. Memory corruption vulnerability in Mozilla Products can be exploited remotely to execute arbitrary code and cause denial of service

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2025-11708
    critical
  • CVE-2025-11709
    critical
  • CVE-2025-11710
    critical
  • CVE-2025-11711
    high
  • CVE-2025-11712
    high
  • CVE-2025-11713
    critical
  • CVE-2025-11714
    critical
  • CVE-2025-11715
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.