从这个网页截图中可以获取到以下关于漏洞的关键信息: 概述 公告日期: January 13, 2026 影响: 高 产品: Thunderbird 修复版本: Thunderbird 140.7 漏洞详情 1. CVE-2026-0877: Mitigation bypass in the DOM: Security component 报告人: mingtijung 影响: 高 2. CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component 报告人: Oskar L 影响: 高 3. CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component 报告人: Oskar L 影响: 高 4. CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component 报告人: Oskar L 影响: 高 5. CVE-2026-0882: Use-after-free in the IPC component 报告人: Randell Jesup 影响: 高 6. CVE-2025-14327: Spoofing issue in the Downloads Panel component 报告人: Caro Kann 影响: 中等 7. CVE-2026-0883: Information disclosure in the Networking component 报告人: Vladislav Plyatsok 影响: 中等 8. CVE-2026-0884: Use-after-free in the JavaScript Engine component 报告人: Gary Kwong and Nan Wang 影响: 中等 9. CVE-2026-0885: Use-after-free in the JavaScript: GC component 报告人: Ivan Kurniawan 影响: 中等 10. CVE-2026-0886: Incorrect boundary conditions in the Graphics component 报告人: Oskar L 影响: 中等 11. CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component 报告人: Lyra Rebane 影响: 中等 12. CVE-2026-0890: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component 报告人: Edgar Chen 影响: 低 13. CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 报告人: Andrew McCreight, Dennis Jackson and the Mozilla Fuzzing Team 影响: 高 描述: 存在一些内存安全漏洞。 以上是该截图中主要的漏洞信息总结。