In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed.
When visiting directory listings for chrome://
URLs as source text, some parameters were reflected.
When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.
This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.