Kaspersky ID:
KLA90956
Bulunma tarihi:
03/24/2026
Yüklendi:
03/30/2026

Açıklama

Multiple vulnerabilities were found in Mozilla Thunderbird ESR. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, cause denial of service, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  2. Information disclosure vulnerability can be exploited to obtain sensitive information.
  3. Security vulnerability can be exploited to bypass security restrictions.
  4. Out of bounds memory read vulnerability in in IMAP parsing can be exploited to cause denial of service.
  5. Denial of service vulnerability can be exploited remotely to cause denial of service.
  6. Type confusion vulnerability can be exploited to cause denial of service.
  7. Out of bounds memory read vulnerability in JIT can be exploited to cause denial of service.
  8. Memory safety vulnerability can be exploited to execute arbitrary code.
  9. Security vulnerability in WebRTC can be exploited to bypass security restrictions.
  10. Use after free vulnerability can be exploited to cause denial of service or execute arbitrary code.
  11. Memory safety vulnerability can be exploited to execute arbitrary code
  12. Security UI vulnerability in the Privacy: Anti-Tracking can be exploited to spoof user interface.
  13. Security UI vulnerability can be exploited to spoof user interface.
  14. An elevation of privilege vulnerability in IPC can be exploited remotely to gain privileges.

Orijinal öneriler

Kötüye kullanma

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

İlgili ürünler

CVE Listesi

  • CVE-2025-59375
    critical
  • CVE-2026-4684
    critical
  • CVE-2026-4685
    critical
  • CVE-2026-4686
    critical
  • CVE-2026-4687
    critical
  • CVE-2026-4688
    critical
  • CVE-2026-4689
    critical
  • CVE-2026-4690
    critical
  • CVE-2026-4691
    critical
  • CVE-2026-4692
    critical
  • CVE-2026-4693
    critical
  • CVE-2026-4694
    critical
  • CVE-2026-4695
    critical
  • CVE-2026-4696
    critical
  • CVE-2026-4697
    critical
  • CVE-2026-4698
    critical
  • CVE-2026-4699
    critical
  • CVE-2026-4700
    critical
  • CVE-2026-4701
    critical
  • CVE-2026-4702
    critical
  • CVE-2026-4704
    critical
  • CVE-2026-4705
    critical
  • CVE-2026-4706
    critical
  • CVE-2026-4707
    critical
  • CVE-2026-4708
    critical
  • CVE-2026-4709
    critical
  • CVE-2026-4710
    critical
  • CVE-2026-4711
    critical
  • CVE-2026-4712
    critical
  • CVE-2026-4713
    critical
  • CVE-2026-4714
    critical
  • CVE-2026-4715
    critical
  • CVE-2026-4716
    critical
  • CVE-2026-4717
    critical
  • CVE-2026-4718
    critical
  • CVE-2026-4719
    critical
  • CVE-2026-4720
    critical
  • CVE-2026-4721
    critical
  • CVE-2026-4722
    critical
  • CVE-2026-4723
    critical
  • CVE-2026-4724
    critical
  • CVE-2026-4725
    critical
  • CVE-2026-4726
    critical
  • CVE-2026-4727
    critical
  • CVE-2026-4728
    high
  • CVE-2026-4729
    critical
  • CVE-2026-3889
    high
  • CVE-2026-4371
    high

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.