关键漏洞信息 漏洞编号与影响等级 CVE-2025-8027: JavaScript engine only wrote partial return value to stack (Impact: High) CVE-2025-8028: Large branch table could lead to truncated instruction (Impact: High) CVE-2025-8029: JavaScript URLs executed on object and embed tags (Impact: Moderate) CVE-2025-8030: DNS rebinding circumvents cors (Impact: Moderate) CVE-2025-8031: Nameless cookies shadow secure cookies (Impact: Moderate) CVE-2025-8032: Potential user-assisted code execution in "Copy as cURL" command (Impact: Moderate) CVE-2025-8033: Incorrect URL stripping in CSP reports (Impact: Moderate) CVE-2025-8034: XSLT documents could bypass CSP (Impact: Moderate) CVE-2025-8035: CSP frame-src was not correctly enforced for paths (Impact: Low) CVE-2025-8036: Search terms persisted in URL bar (Impact: Low) CVE-2025-8037: Incorrect JavaScript state machine for generators (Impact: Low) CVE-2025-8038: Memory safety bugs fixed in Firefox ESR 118.2.6, Firefox ESR 128.1.3, Thunderbird ESR 128.1.3, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141, and Thunderbird 141 (Impact: High) CVE-2025-8039: Memory safety bugs fixed in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141, and Thunderbird 141 (Impact: High) CVE-2025-8040: Memory safety bugs fixed in Firefox ESR 128.1.3, Thunderbird ESR 128.1.3, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141, and Thunderbird 141 (Impact: High) 影响的产品和版本 Thunderbird 140.1 报告者 各个漏洞的报告者包括:PS MOPP、Gary Kwong、David Keeler、Vladimir Vukicevic、Luke Wagner、Tom Schuster、Jon Coppeard、Steve Michaud、David Keeler、Andrew McColm、Aditya Kulkarni等。 描述 各个漏洞的具体描述,如JavaScript引擎问题、DNS重绑定绕过CORS、内存安全问题等。