Описание
Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Use after free vulnerability in GC can be exploited to cause denial of service or execute arbitrary code.
- Security vulnerability in DOM can be exploited to bypass security restrictions.
- Use after free vulnerability in IPC can be exploited to cause denial of service or execute arbitrary code.
- Security UI vulnerability in Copy & Paste and Drag & Drop can be exploited to spoof user interface.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Information disclosure vulnerability in Networking for Windows can be exploited to obtain sensitive information.
- Use after free vulnerability in JavaScript Engine can be exploited to cause denial of service or execute arbitrary code.
- Integer overflow vulnerability in Graphics can be exploited to cause denial of service.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2026-0877 critical
- CVE-2026-0878 critical
- CVE-2026-0879 critical
- CVE-2026-0880 critical
- CVE-2026-0882 critical
- CVE-2026-0883 high
- CVE-2026-0884 critical
- CVE-2026-0885 high
- CVE-2026-0886 high
- CVE-2026-0887 warning
- CVE-2026-0890 high
- CVE-2026-0891 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!