Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

3513 vulnerabilities by mozilla

CVE-2026-6786 (GCVE-0-2026-6786)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150
Summary
Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Alex Franchuk, Andrew McCreight, Brian Grinstead, Christian Holler, Jan de Mooij, Maurice Dauer, Sebastian Hengst, Tom Schuster and the Mozilla Fuzzing Team
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Alex Franchuk, Andrew McCreight, Brian Grinstead, Christian Holler, Jan de Mooij, Maurice Dauer, Sebastian Hengst, Tom Schuster and the Mozilla Fuzzing Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:14.629Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "name": "Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150",
          "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=2010727%2C2019004%2C2019224%2C2019547%2C2020378%2C2022381%2C2022608%2C2022785%2C2023120%2C2023128%2C2023140%2C2023279%2C2023836%2C2023882%2C2023925%2C2023950%2C2023959%2C2023965%2C2024243%2C2024245%2C2024247%2C2024253%2C2024346%2C2024357%2C2024416%2C2024420%2C2024429%2C2024432%2C2024455%2C2024466%2C2024468%2C2024476%2C2024664%2C2024666%2C2024669%2C2024670%2C2024671%2C2024761%2C2024918%2C2025292%2C2025332%2C2025348%2C2025384%2C2025395%2C2025458%2C2025461%2C2025463%2C2025481%2C2025483%2C2025485%2C2025494%2C2025506%2C2025511%2C2025513%2C2025520%2C2026277%2C2026282%2C2026288%2C2026289%2C2026311%2C2026312%2C2026869%2C2027152%2C2027161%2C2027238%2C2027261%2C2027269%2C2027274%2C2027280%2C2027281%2C2027300%2C2027302%2C2027331%2C2027339%2C2027340%2C2027738%2C2027975%2C2028000%2C2028011%2C2028289%2C2028525%2C2028728%2C2028887%2C2028888%2C2028896%2C2029063%2C2029064%2C2029290%2C2029291%2C2029294%2C2029300%2C2029304%2C2029316%2C2029317%2C2029401%2C2029415%2C2029430%2C2029457%2C2029727%2C2029735%2C2029743%2C2029752%2C2029754%2C2029776%2C2029809%2C2030324%2C2030370"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6786",
    "datePublished": "2026-04-21T12:41:14.629Z",
    "dateReserved": "2026-04-21T12:41:14.326Z",
    "dateUpdated": "2026-04-21T12:41:14.629Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6785 (GCVE-0-2026-6785)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150
Summary
Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 115.35 , ≤ 115.* (rpm)
Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Andrew McCreight, Ashley Zebrowski, Brian Grinstead, Christian Holler, Maurice Dauer, Tom Schuster and the Mozilla Fuzzing Team
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "115.*",
              "status": "unaffected",
              "version": "115.35",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Andrew McCreight, Ashley Zebrowski, Brian Grinstead, Christian Holler, Maurice Dauer, Tom Schuster and the Mozilla Fuzzing Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
            }
          ],
          "value": "Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:13.980Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "name": "Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150",
          "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1935995%2C1999158%2C2015952%2C2021909%2C2022026%2C2022041%2C2022088%2C2022276%2C2022335%2C2022338%2C2022373%2C2022597%2C2022874%2C2023276%2C2023544%2C2023551%2C2023599%2C2023608%2C2023814%2C2024233%2C2024239%2C2024241%2C2024242%2C2024250%2C2024251%2C2024343%2C2024422%2C2024425%2C2024440%2C2024442%2C2024446%2C2024458%2C2024463%2C2024478%2C2024650%2C2024653%2C2024654%2C2024655%2C2024656%2C2024661%2C2024662%2C2024668%2C2024919%2C2025278%2C2025349%2C2025350%2C2025354%2C2025360%2C2025363%2C2025370%2C2025379%2C2025381%2C2025399%2C2025400%2C2025403%2C2025407%2C2025415%2C2025420%2C2025427%2C2025429%2C2025430%2C2025479%2C2025489%2C2025493%2C2025497%2C2025502%2C2025515%2C2025517%2C2025526%2C2025609%2C2025948%2C2025949%2C2025951%2C2025953%2C2025955%2C2025962%2C2025969%2C2025970%2C2025971%2C2025973%2C2025976%2C2025977%2C2026280%2C2026285%2C2026293%2C2026296%2C2026310%2C2027237%2C2027260%2C2027268%2C2027277%2C2027284%2C2027291%2C2027293%2C2027298%2C2027330%2C2027342%2C2027345%2C2027359%2C2027365%2C2027378%2C2027754%2C2027959%2C2027962%2C2027964%2C2027971%2C2027974%2C2027979%2C2027982%2C2027995%2C2028001%2C2028267%2C2028268%2C2028275%2C2028288%2C2028290%2C2028291%2C2028528%2C2028551%2C2028627%2C2028879%2C2028889%2C2029061%2C2029071%2C2029283%2C2029296%2C2029314%2C2029323%2C2029411%2C2029423%2C2029424%2C2029425%2C2029427%2C2029436%2C2029440%2C2029449%2C2029450%2C2029458%2C2029462%2C2029468%2C2029472%2C2029690%2C2029707%2C2029708%2C2029728%2C2029802%2C2029896%2C2029906%2C2030106%2C2030118%2C2030123%2C2030135%2C2030230%2C2030320"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-31/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6785",
    "datePublished": "2026-04-21T12:41:13.980Z",
    "dateReserved": "2026-04-21T12:41:13.671Z",
    "dateUpdated": "2026-04-21T12:41:13.980Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6784 (GCVE-0-2026-6784)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Memory safety bugs fixed in Firefox 150 and Thunderbird 150
Summary
Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Ben Visness, Brian Grinstead, Christian Holler, Dimi Lee, Jens Stutte, Jim Mathies, John Schanck, Jon Coppeard, Karl Tomlinson, Maurice Dauer, Nika Layzell, Randell Jesup, Tom Schuster and the Mozilla Fuzzing Team
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Ben Visness, Brian Grinstead, Christian Holler, Dimi Lee, Jens Stutte, Jim Mathies, John Schanck, Jon Coppeard, Karl Tomlinson, Maurice Dauer, Nika Layzell, Randell Jesup, Tom Schuster and the Mozilla Fuzzing Team"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:13.111Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "name": "Memory safety bugs fixed in Firefox 150 and Thunderbird 150",
          "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1536243%2C1745382%2C1851073%2C1893400%2C1963301%2C2001319%2C2002899%2C2012436%2C2014435%2C2016901%2C2019916%2C2020486%2C2020612%2C2020817%2C2021788%2C2022051%2C2022367%2C2022431%2C2023302%2C2023670%2C2024225%2C2024238%2C2024240%2C2024265%2C2024367%2C2024369%2C2024424%2C2024760%2C2025281%2C2025361%2C2025387%2C2025466%2C2025954%2C2025958%2C2026278%2C2026292%2C2026297%2C2026378%2C2027148%2C2027287%2C2027341%2C2027384%2C2027427%2C2027694%2C2027993%2C2028009%2C2028270%2C2028416%2C2028524%2C2029295%2C2029301%2C2029461%2C2029699%2C2029800%2C2029801"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Memory safety bugs fixed in Firefox 150 and Thunderbird 150"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6784",
    "datePublished": "2026-04-21T12:41:13.111Z",
    "dateReserved": "2026-04-21T12:41:12.823Z",
    "dateUpdated": "2026-04-21T12:41:13.111Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6783 (GCVE-0-2026-6783)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Incorrect boundary conditions, integer overflow in the Audio/Video: Playback component
Summary
Incorrect boundary conditions, integer overflow in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
crixer
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "crixer"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect boundary conditions, integer overflow in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Incorrect boundary conditions, integer overflow in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:12.492Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2027564"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Incorrect boundary conditions, integer overflow in the Audio/Video: Playback component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6783",
    "datePublished": "2026-04-21T12:41:12.492Z",
    "dateReserved": "2026-04-21T12:41:12.181Z",
    "dateUpdated": "2026-04-21T12:41:12.492Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6782 (GCVE-0-2026-6782)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Information disclosure in the IP Protection component
Summary
Information disclosure in the IP Protection component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Yuki Umemura
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Yuki Umemura"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Information disclosure in the IP Protection component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Information disclosure in the IP Protection component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:11.823Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2026571"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Information disclosure in the IP Protection component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6782",
    "datePublished": "2026-04-21T12:41:11.823Z",
    "dateReserved": "2026-04-21T12:41:11.541Z",
    "dateUpdated": "2026-04-21T12:41:11.823Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6781 (GCVE-0-2026-6781)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Denial-of-service in the Audio/Video: Playback component
Summary
Denial-of-service in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
LatticeBased
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "LatticeBased"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Denial-of-service in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Denial-of-service in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:11.105Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2025583"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Denial-of-service in the Audio/Video: Playback component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6781",
    "datePublished": "2026-04-21T12:41:11.105Z",
    "dateReserved": "2026-04-21T12:41:10.731Z",
    "dateUpdated": "2026-04-21T12:41:11.105Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6780 (GCVE-0-2026-6780)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Denial-of-service in the Audio/Video: Playback component
Summary
Denial-of-service in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
LatticeBased
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "LatticeBased"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Denial-of-service in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Denial-of-service in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:10.362Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2025179"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Denial-of-service in the Audio/Video: Playback component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6780",
    "datePublished": "2026-04-21T12:41:10.362Z",
    "dateReserved": "2026-04-21T12:41:10.075Z",
    "dateUpdated": "2026-04-21T12:41:10.362Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6779 (GCVE-0-2026-6779)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Other issue in the JavaScript Engine component
Summary
Other issue in the JavaScript Engine component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Gary Kwong
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Gary Kwong"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Other issue in the JavaScript Engine component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Other issue in the JavaScript Engine component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:09.740Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2023343"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Other issue in the JavaScript Engine component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6779",
    "datePublished": "2026-04-21T12:41:09.740Z",
    "dateReserved": "2026-04-21T12:41:09.461Z",
    "dateUpdated": "2026-04-21T12:41:09.740Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6778 (GCVE-0-2026-6778)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Invalid pointer in the Audio/Video: Playback component
Summary
Invalid pointer in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
chanhokim
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "chanhokim"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Invalid pointer in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Invalid pointer in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:09.098Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2022746"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Invalid pointer in the Audio/Video: Playback component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6778",
    "datePublished": "2026-04-21T12:41:09.098Z",
    "dateReserved": "2026-04-21T12:41:08.788Z",
    "dateUpdated": "2026-04-21T12:41:09.098Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6777 (GCVE-0-2026-6777)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Other issue in the Networking: DNS component
Summary
Other issue in the Networking: DNS component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
b00rito
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "b00rito"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Other issue in the Networking: DNS component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Other issue in the Networking: DNS component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:08.452Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2022726"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Other issue in the Networking: DNS component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6777",
    "datePublished": "2026-04-21T12:41:08.452Z",
    "dateReserved": "2026-04-21T12:41:08.101Z",
    "dateUpdated": "2026-04-21T12:41:08.452Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6776 (GCVE-0-2026-6776)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Incorrect boundary conditions in the WebRTC: Networking component
Summary
Incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Nan Wang
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Nan Wang"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:07.745Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2021770"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Incorrect boundary conditions in the WebRTC: Networking component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6776",
    "datePublished": "2026-04-21T12:41:07.745Z",
    "dateReserved": "2026-04-21T12:41:07.296Z",
    "dateUpdated": "2026-04-21T12:41:07.745Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6775 (GCVE-0-2026-6775)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Incorrect boundary conditions in the WebRTC component
Summary
Incorrect boundary conditions in the WebRTC component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Nan Wang
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Nan Wang"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect boundary conditions in the WebRTC component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Incorrect boundary conditions in the WebRTC component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:06.920Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2021768"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Incorrect boundary conditions in the WebRTC component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6775",
    "datePublished": "2026-04-21T12:41:06.920Z",
    "dateReserved": "2026-04-21T12:41:06.557Z",
    "dateUpdated": "2026-04-21T12:41:06.920Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6774 (GCVE-0-2026-6774)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Mitigation bypass in the DOM: Security component
Summary
Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
lebr0nli
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "lebr0nli"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:05.957Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2016915"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Mitigation bypass in the DOM: Security component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6774",
    "datePublished": "2026-04-21T12:41:05.957Z",
    "dateReserved": "2026-04-21T12:41:05.633Z",
    "dateUpdated": "2026-04-21T12:41:05.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6773 (GCVE-0-2026-6773)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Denial-of-service due to integer overflow in the Graphics: WebGPU component
Summary
Denial-of-service due to integer overflow in the Graphics: WebGPU component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Richard Belisle
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Richard Belisle"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Denial-of-service due to integer overflow in the Graphics: WebGPU component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Denial-of-service due to integer overflow in the Graphics: WebGPU component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:05.301Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2015959"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Denial-of-service due to integer overflow in the Graphics: WebGPU component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6773",
    "datePublished": "2026-04-21T12:41:05.301Z",
    "dateReserved": "2026-04-21T12:41:04.962Z",
    "dateUpdated": "2026-04-21T12:41:05.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6772 (GCVE-0-2026-6772)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Incorrect boundary conditions in the Libraries component in NSS
Summary
Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 115.35 , ≤ 115.* (rpm)
Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
sseehra
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "115.*",
              "status": "unaffected",
              "version": "115.35",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "sseehra"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
            }
          ],
          "value": "Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:04.596Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2026089"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-31/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Incorrect boundary conditions in the Libraries component in NSS"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6772",
    "datePublished": "2026-04-21T12:41:04.596Z",
    "dateReserved": "2026-04-21T12:41:04.255Z",
    "dateUpdated": "2026-04-21T12:41:04.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6771 (GCVE-0-2026-6771)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Mitigation bypass in the DOM: Security component
Summary
Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Rayhan Hanaputra
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Rayhan Hanaputra"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:03.920Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2025067"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Mitigation bypass in the DOM: Security component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6771",
    "datePublished": "2026-04-21T12:41:03.920Z",
    "dateReserved": "2026-04-21T12:41:03.627Z",
    "dateUpdated": "2026-04-21T12:41:03.920Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6770 (GCVE-0-2026-6770)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Other issue in the Storage: IndexedDB component
Summary
Other issue in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Dai
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Dai"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Other issue in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Other issue in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:03.257Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2024220"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Other issue in the Storage: IndexedDB component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6770",
    "datePublished": "2026-04-21T12:41:03.257Z",
    "dateReserved": "2026-04-21T12:41:02.849Z",
    "dateUpdated": "2026-04-21T12:41:03.257Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6769 (GCVE-0-2026-6769)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Privilege escalation in the Debugger component
Summary
Privilege escalation in the Debugger component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Tomoya Nakanishi
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Tomoya Nakanishi"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Privilege escalation in the Debugger component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Privilege escalation in the Debugger component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:02.147Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2023753"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Privilege escalation in the Debugger component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6769",
    "datePublished": "2026-04-21T12:41:02.147Z",
    "dateReserved": "2026-04-21T12:41:01.657Z",
    "dateUpdated": "2026-04-21T12:41:02.147Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6768 (GCVE-0-2026-6768)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Mitigation bypass in the Networking: Cookies component
Summary
Mitigation bypass in the Networking: Cookies component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Satoki Tsuji
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Satoki Tsuji"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Mitigation bypass in the Networking: Cookies component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Mitigation bypass in the Networking: Cookies component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:01.028Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2023615"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Mitigation bypass in the Networking: Cookies component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6768",
    "datePublished": "2026-04-21T12:41:01.028Z",
    "dateReserved": "2026-04-21T12:41:00.686Z",
    "dateUpdated": "2026-04-21T12:41:01.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6767 (GCVE-0-2026-6767)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:41 – Updated: 2026-04-21 12:41
VLAI?
Title
Other issue in the Libraries component in NSS
Summary
Other issue in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 115.35 , ≤ 115.* (rpm)
Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Haruto Kimura
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "115.*",
              "status": "unaffected",
              "version": "115.35",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Haruto Kimura"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Other issue in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
            }
          ],
          "value": "Other issue in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:41:00.326Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2023209"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-31/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Other issue in the Libraries component in NSS"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6767",
    "datePublished": "2026-04-21T12:41:00.326Z",
    "dateReserved": "2026-04-21T12:40:59.989Z",
    "dateUpdated": "2026-04-21T12:41:00.326Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6766 (GCVE-0-2026-6766)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Incorrect boundary conditions in the Libraries component in NSS
Summary
Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Haruto Kimura
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Haruto Kimura"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:59.634Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2023207"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Incorrect boundary conditions in the Libraries component in NSS"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6766",
    "datePublished": "2026-04-21T12:40:59.634Z",
    "dateReserved": "2026-04-21T12:40:59.297Z",
    "dateUpdated": "2026-04-21T12:40:59.634Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6765 (GCVE-0-2026-6765)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Information disclosure in the Form Autofill component
Summary
Information disclosure in the Form Autofill component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
ABDULAZIZ ALASAIQAH
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "ABDULAZIZ ALASAIQAH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Information disclosure in the Form Autofill component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Information disclosure in the Form Autofill component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:58.955Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2022419"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Information disclosure in the Form Autofill component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6765",
    "datePublished": "2026-04-21T12:40:58.955Z",
    "dateReserved": "2026-04-21T12:40:58.662Z",
    "dateUpdated": "2026-04-21T12:40:58.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6764 (GCVE-0-2026-6764)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Incorrect boundary conditions in the DOM: Device Interfaces component
Summary
Incorrect boundary conditions in the DOM: Device Interfaces component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Florian
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Florian"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect boundary conditions in the DOM: Device Interfaces component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Incorrect boundary conditions in the DOM: Device Interfaces component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:58.297Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2022162"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Incorrect boundary conditions in the DOM: Device Interfaces component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6764",
    "datePublished": "2026-04-21T12:40:58.297Z",
    "dateReserved": "2026-04-21T12:40:57.986Z",
    "dateUpdated": "2026-04-21T12:40:58.297Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6763 (GCVE-0-2026-6763)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Mitigation bypass in the File Handling component
Summary
Mitigation bypass in the File Handling component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Tomoya Nakanishi
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Tomoya Nakanishi"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Mitigation bypass in the File Handling component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Mitigation bypass in the File Handling component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:57.591Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2021666"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Mitigation bypass in the File Handling component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6763",
    "datePublished": "2026-04-21T12:40:57.591Z",
    "dateReserved": "2026-04-21T12:40:57.216Z",
    "dateUpdated": "2026-04-21T12:40:57.591Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6762 (GCVE-0-2026-6762)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Spoofing issue in the DOM: Core & HTML component
Summary
Spoofing issue in the DOM: Core & HTML component. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 115.35 , ≤ 115.* (rpm)
Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Farras Givari
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "115.*",
              "status": "unaffected",
              "version": "115.35",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Farras Givari"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Spoofing issue in the DOM: Core \u0026 HTML component. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
            }
          ],
          "value": "Spoofing issue in the DOM: Core \u0026 HTML component. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:56.838Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2021080"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-31/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Spoofing issue in the DOM: Core \u0026 HTML component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6762",
    "datePublished": "2026-04-21T12:40:56.838Z",
    "dateReserved": "2026-04-21T12:40:56.529Z",
    "dateUpdated": "2026-04-21T12:40:56.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6761 (GCVE-0-2026-6761)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Privilege escalation in the Networking component
Summary
Privilege escalation in the Networking component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
kiyong
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "kiyong"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Privilege escalation in the Networking component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Privilege escalation in the Networking component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:56.138Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2017857"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Privilege escalation in the Networking component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6761",
    "datePublished": "2026-04-21T12:40:56.138Z",
    "dateReserved": "2026-04-21T12:40:55.759Z",
    "dateUpdated": "2026-04-21T12:40:56.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6760 (GCVE-0-2026-6760)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Mitigation bypass in the Networking: Cookies component
Summary
Mitigation bypass in the Networking: Cookies component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Richard Belisle
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Richard Belisle"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Mitigation bypass in the Networking: Cookies component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Mitigation bypass in the Networking: Cookies component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:55.131Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2016923"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Mitigation bypass in the Networking: Cookies component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6760",
    "datePublished": "2026-04-21T12:40:55.131Z",
    "dateReserved": "2026-04-21T12:40:54.751Z",
    "dateUpdated": "2026-04-21T12:40:55.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6759 (GCVE-0-2026-6759)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Use-after-free in the Widget: Cocoa component
Summary
Use-after-free in the Widget: Cocoa component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Steven Michaud
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Steven Michaud"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use-after-free in the Widget: Cocoa component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Use-after-free in the Widget: Cocoa component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:54.329Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2016164"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Use-after-free in the Widget: Cocoa component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6759",
    "datePublished": "2026-04-21T12:40:54.329Z",
    "dateReserved": "2026-04-21T12:40:54.035Z",
    "dateUpdated": "2026-04-21T12:40:54.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6758 (GCVE-0-2026-6758)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Use-after-free in the JavaScript: WebAssembly component
Summary
Use-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Use-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150."
            }
          ],
          "value": "Use-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:53.661Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2013619"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        }
      ],
      "title": "Use-after-free in the JavaScript: WebAssembly component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6758",
    "datePublished": "2026-04-21T12:40:53.661Z",
    "dateReserved": "2026-04-21T12:40:53.328Z",
    "dateUpdated": "2026-04-21T12:40:53.661Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-6757 (GCVE-0-2026-6757)

Vulnerability from cvelistv5 – Published: 2026-04-21 12:40 – Updated: 2026-04-21 12:40
VLAI?
Title
Invalid pointer in the JavaScript: WebAssembly component
Summary
Invalid pointer in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Mozilla Firefox Unaffected: 140.10 , ≤ 140.* (rpm)
Unaffected: 150 , ≤ * (rpm)
Create a notification for this product.
Credits
Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "Firefox",
          "vendor": "Mozilla",
          "versions": [
            {
              "lessThanOrEqual": "140.*",
              "status": "unaffected",
              "version": "140.10",
              "versionType": "rpm"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "150",
              "versionType": "rpm"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Invalid pointer in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
            }
          ],
          "value": "Invalid pointer in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-21T12:40:52.961Z",
        "orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
        "shortName": "mozilla"
      },
      "references": [
        {
          "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2013588"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-30/"
        },
        {
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-32/"
        }
      ],
      "title": "Invalid pointer in the JavaScript: WebAssembly component"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
    "assignerShortName": "mozilla",
    "cveId": "CVE-2026-6757",
    "datePublished": "2026-04-21T12:40:52.961Z",
    "dateReserved": "2026-04-21T12:40:52.634Z",
    "dateUpdated": "2026-04-21T12:40:52.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}