CVE-2025-0237: The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. CVE-2025-0238: Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. CVE-2025-0239: When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. CVE-2025-0240: Parsing a JavaScript module as JSON could under some circumstances cause cross-compartment access, which may result in a use-after-free. CVE-2025-0241: When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. CVE-2025-0242: Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. CVE-2025-0243: Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. Firefox 134: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/ Firefox ESR 128.6: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/ Thunderbird 134: https://www.mozilla.org/en-US/security/advisories/mfsa2025-04/ Thunderbird 128.6: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/