Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-2634 (GCVE-0-2026-2634)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-27 20:55
VLAI?
EPSS
Title
Spoofed web content presented under trusted domains using scripted navigation on Firefox iOS
Summary
Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS < 147.4.
Severity ?
9.8 (Critical)
CWE
- CWE-451 - User Interface (UI) Misrepresentation of Critical Information
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mozilla | Firefox for iOS |
Affected:
unspecified , < 147.4
(custom)
|
Credits
Renwa
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-2634",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-27T20:55:08.919904Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-451",
"description": "CWE-451 User Interface (UI) Misrepresentation of Critical Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-27T20:55:35.483Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firefox for iOS",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "147.4",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Renwa"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4."
}
],
"value": "Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T13:33:24.725Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1975529"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-12/"
}
],
"title": "Spoofed web content presented under trusted domains using scripted navigation on Firefox iOS"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2634",
"datePublished": "2026-02-24T13:33:24.725Z",
"dateReserved": "2026-02-17T18:31:35.581Z",
"dateUpdated": "2026-02-27T20:55:35.483Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-2634\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2026-02-24T14:16:23.810\",\"lastModified\":\"2026-02-27T21:16:19.743\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-451\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"147.4\",\"matchCriteriaId\":\"DDE93FFB-F63D-4D64-906B-17F578E83996\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1975529\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2026-12/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-2634\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-27T20:55:08.919904Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-451\", \"description\": \"CWE-451 User Interface (UI) Misrepresentation of Critical Information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-27T20:54:04.113Z\"}}], \"cna\": {\"title\": \"Spoofed web content presented under trusted domains using scripted navigation on Firefox iOS\", \"credits\": [{\"lang\": \"en\", \"value\": \"Renwa\"}], \"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Firefox for iOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"147.4\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1975529\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2026-12/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2026-02-24T13:33:24.725Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-2634\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-27T20:55:35.483Z\", \"dateReserved\": \"2026-02-17T18:31:35.581Z\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"datePublished\": \"2026-02-24T13:33:24.725Z\", \"assignerShortName\": \"mozilla\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-2634
Vulnerability from fkie_nvd - Published: 2026-02-24 14:16 - Updated: 2026-02-27 21:16
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS < 147.4.
References
| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1975529 | Issue Tracking, Permissions Required | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2026-12/ | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
"matchCriteriaId": "DDE93FFB-F63D-4D64-906B-17F578E83996",
"versionEndExcluding": "147.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4."
},
{
"lang": "es",
"value": "Scripts maliciosos podr\u00edan causar desincronizaci\u00f3n entre la barra de direcciones y el contenido web antes de que se reciba una respuesta en Firefox iOS, permitiendo que p\u00e1ginas controladas por el atacante se presenten bajo dominios falsificados. Esta vulnerabilidad afecta a Firefox para iOS \u0026lt; 147.4."
}
],
"id": "CVE-2026-2634",
"lastModified": "2026-02-27T21:16:19.743",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-02-24T14:16:23.810",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1975529"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2026-12/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-451"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2026-AVI-0204
Vulnerability from certfr_avis - Published: 2026-02-25 - Updated: 2026-02-25
De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox | Firefox pour iOS versions antérieures à 147.4 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 140.8 | ||
| Mozilla | Firefox | Firefox versions antérieures à 148 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 115.33 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 148 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 140.8 |
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox pour iOS versions ant\u00e9rieures \u00e0 147.4",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 140.8",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 148",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 115.33",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 148",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 140.8",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-2777",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2777"
},
{
"name": "CVE-2026-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2773"
},
{
"name": "CVE-2026-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2763"
},
{
"name": "CVE-2026-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2783"
},
{
"name": "CVE-2026-2786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2786"
},
{
"name": "CVE-2026-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2778"
},
{
"name": "CVE-2026-2788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2788"
},
{
"name": "CVE-2026-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2758"
},
{
"name": "CVE-2026-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2779"
},
{
"name": "CVE-2026-2771",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2771"
},
{
"name": "CVE-2026-2769",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2769"
},
{
"name": "CVE-2026-2799",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2799"
},
{
"name": "CVE-2026-2775",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2775"
},
{
"name": "CVE-2026-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2790"
},
{
"name": "CVE-2026-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2784"
},
{
"name": "CVE-2026-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2806"
},
{
"name": "CVE-2026-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2760"
},
{
"name": "CVE-2026-2792",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2792"
},
{
"name": "CVE-2026-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2807"
},
{
"name": "CVE-2026-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2781"
},
{
"name": "CVE-2026-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2759"
},
{
"name": "CVE-2026-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2776"
},
{
"name": "CVE-2026-2764",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2764"
},
{
"name": "CVE-2026-2762",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2762"
},
{
"name": "CVE-2026-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2791"
},
{
"name": "CVE-2026-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2797"
},
{
"name": "CVE-2026-2794",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2794"
},
{
"name": "CVE-2026-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2765"
},
{
"name": "CVE-2026-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2770"
},
{
"name": "CVE-2026-2768",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2768"
},
{
"name": "CVE-2026-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2802"
},
{
"name": "CVE-2026-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2789"
},
{
"name": "CVE-2026-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2787"
},
{
"name": "CVE-2026-2772",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2772"
},
{
"name": "CVE-2026-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2798"
},
{
"name": "CVE-2026-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2803"
},
{
"name": "CVE-2026-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2805"
},
{
"name": "CVE-2026-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2780"
},
{
"name": "CVE-2026-2782",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2782"
},
{
"name": "CVE-2026-2766",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2766"
},
{
"name": "CVE-2026-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2796"
},
{
"name": "CVE-2026-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2800"
},
{
"name": "CVE-2026-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2774"
},
{
"name": "CVE-2026-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2801"
},
{
"name": "CVE-2026-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2785"
},
{
"name": "CVE-2026-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2634"
},
{
"name": "CVE-2026-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2757"
},
{
"name": "CVE-2026-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2761"
},
{
"name": "CVE-2026-2793",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2793"
},
{
"name": "CVE-2026-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2804"
},
{
"name": "CVE-2026-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2795"
},
{
"name": "CVE-2026-2767",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2767"
}
],
"initial_release_date": "2026-02-25T00:00:00",
"last_revision_date": "2026-02-25T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0204",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Mozilla. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2026-14",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-14/"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2026-15",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2026-12",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-12/"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2026-13",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2026-17",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-17/"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2026-16",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-16/"
}
]
}
WID-SEC-W-2026-0497
Vulnerability from csaf_certbund - Published: 2026-02-24 23:00 - Updated: 2026-03-25 23:00Summary
Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Firefox ist ein Open Source Web Browser.
Firefox ist ein Open Source Web Browser.
ESR ist die Variante mit verlängertem Support.
Thunderbird ist ein Open Source E-Mail Client.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird ausnutzen, um beliebigen Code auszuführen, sich erhöhte Rechte zu verschaffen, einen Denial-of-Service-Zustand herbeizuführen, sensible Informationen offenzulegen, Spoofing-Angriffe durchzuführen, Sicherheitsmaßnahmen zu umgehen oder andere nicht spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme: - MacOS X
- Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Firefox ist ein Open Source Web Browser.\r\nFirefox ist ein Open Source Web Browser. \r\nESR ist die Variante mit verl\u00e4ngertem Support.\r\nThunderbird ist ein Open Source E-Mail Client.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Mozilla Firefox, Mozilla Firefox ESR und Mozilla Thunderbird ausnutzen, um beliebigen Code auszuf\u00fchren, sich erh\u00f6hte Rechte zu verschaffen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, sensible Informationen offenzulegen, Spoofing-Angriffe durchzuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder andere nicht spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0497 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0497.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0497 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0497"
},
{
"category": "external",
"summary": "MFSA 2026-12 Security Vulnerabilities fixed in Firefox for iOS 147.4 vom 2026-02-24",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-12/"
},
{
"category": "external",
"summary": "MFSA 2026-13 Security Vulnerabilities fixed in Firefox 148 vom 2026-02-24",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/"
},
{
"category": "external",
"summary": "MFSA 2026-14 Security Vulnerabilities fixed in Firefox ESR 115.33 vom 2026-02-24",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-14/"
},
{
"category": "external",
"summary": "MFSA 2026-15 Security Vulnerabilities fixed in Firefox ESR 140.8 vom 2026-02-24",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/"
},
{
"category": "external",
"summary": "MFSA 2026-16 Security Vulnerabilities fixed in Thunderbird 148 vom 2026-02-24",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-16/"
},
{
"category": "external",
"summary": "MFSA 2026-17 Security Vulnerabilities fixed in Thunderbird 140.8 vom 2026-02-24",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-17/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3339 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3339"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10242-1 vom 2026-02-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOYQZDLF7VEL3ZUY46SS34MOSIMJTZ3L/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6148 vom 2026-02-25",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00057.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3361 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3361"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3338 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3338"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6149 vom 2026-02-26",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00058.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3339 vom 2026-02-27",
"url": "http://linux.oracle.com/errata/ELSA-2026-3339.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3361 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3361"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3339 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3339"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3338 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3338"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3361 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3361.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3338 vom 2026-02-27",
"url": "http://linux.oracle.com/errata/ELSA-2026-3338.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3495 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3495"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3497 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3493 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3493"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4495 vom 2026-02-28",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00034.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6152 vom 2026-02-28",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00061.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3496 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3496"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3494 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3494"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10257-1 vom 2026-02-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7GX3YZM5UTV3V2KG6DNS4MDJZ2U7AUP/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3491 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3491"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3492 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3492"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3517 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3516 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3516"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0740-1 vom 2026-03-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024523.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3515 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3515"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4496 vom 2026-03-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00000.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3517 vom 2026-03-03",
"url": "https://linux.oracle.com/errata/ELSA-2026-3517.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3516 vom 2026-03-03",
"url": "https://linux.oracle.com/errata/ELSA-2026-3516.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3515 vom 2026-03-03",
"url": "https://errata.build.resf.org/RLSA-2026:3515"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3516 vom 2026-03-03",
"url": "https://errata.build.resf.org/RLSA-2026:3516"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3515 vom 2026-03-03",
"url": "https://linux.oracle.com/errata/ELSA-2026-3515.html"
},
{
"category": "external",
"summary": "IGEL Security Notice ISN-2026-05 vom 2026-03-03",
"url": "https://kb.igel.com/en/security-safety/current/isn-2026-05-firefox-esr-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8071-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8071-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8071-2 vom 2026-03-05",
"url": "https://ubuntu.com/security/notices/USN-8071-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0814-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024583.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0812-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0813-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024585.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3978 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3978"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3979 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3979"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3984 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3984"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3980 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3980"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3982 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3982"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3983 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3983"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3981 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3981"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4022 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4022"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3976 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3976"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4260 vom 2026-03-11",
"url": "https://access.redhat.com/errata/RHSA-2026:4260"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0871-1 vom 2026-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4432 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4432"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0880-1 vom 2026-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3198 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3198.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2FIREFOX-2026-054 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2FIREFOX-2026-054.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4508 vom 2026-03-25",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00012.html"
}
],
"source_lang": "en-US",
"title": "Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-25T23:00:00.000+00:00",
"generator": {
"date": "2026-03-26T08:07:55.809+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0497",
"initial_release_date": "2026-02-24T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE, Debian und Red Hat aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian, Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat, Debian und openSUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE, Red Hat, Debian und Oracle Linux aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "IGEL OS",
"product": {
"name": "IGEL OS",
"product_id": "T017865",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:-"
}
}
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "iOS \u003c147.4",
"product": {
"name": "Mozilla Firefox iOS \u003c147.4",
"product_id": "T051133"
}
},
{
"category": "product_version",
"name": "iOS 147.4",
"product": {
"name": "Mozilla Firefox iOS 147.4",
"product_id": "T051133-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:ios__147.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c148",
"product": {
"name": "Mozilla Firefox \u003c148",
"product_id": "T051135"
}
},
{
"category": "product_version",
"name": "148",
"product": {
"name": "Mozilla Firefox 148",
"product_id": "T051135-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox:148"
}
}
}
],
"category": "product_name",
"name": "Firefox"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c115.33",
"product": {
"name": "Mozilla Firefox ESR \u003c115.33",
"product_id": "T051136"
}
},
{
"category": "product_version",
"name": "115.33",
"product": {
"name": "Mozilla Firefox ESR 115.33",
"product_id": "T051136-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:115.33"
}
}
},
{
"category": "product_version_range",
"name": "\u003c140.8",
"product": {
"name": "Mozilla Firefox ESR \u003c140.8",
"product_id": "T051137"
}
},
{
"category": "product_version",
"name": "140.8",
"product": {
"name": "Mozilla Firefox ESR 140.8",
"product_id": "T051137-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:firefox_esr:140.8"
}
}
}
],
"category": "product_name",
"name": "Firefox ESR"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c148",
"product": {
"name": "Mozilla Thunderbird \u003c148",
"product_id": "T051138"
}
},
{
"category": "product_version",
"name": "148",
"product": {
"name": "Mozilla Thunderbird 148",
"product_id": "T051138-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:148"
}
}
},
{
"category": "product_version_range",
"name": "\u003c140.8",
"product": {
"name": "Mozilla Thunderbird \u003c140.8",
"product_id": "T051139"
}
},
{
"category": "product_version",
"name": "140.8",
"product": {
"name": "Mozilla Thunderbird 140.8",
"product_id": "T051139-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:mozilla:thunderbird:140.8"
}
}
}
],
"category": "product_name",
"name": "Thunderbird"
}
],
"category": "vendor",
"name": "Mozilla"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-2634",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2634"
},
{
"cve": "CVE-2026-2757",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2757"
},
{
"cve": "CVE-2026-2758",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2758"
},
{
"cve": "CVE-2026-2759",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2759"
},
{
"cve": "CVE-2026-2760",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2760"
},
{
"cve": "CVE-2026-2761",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2761"
},
{
"cve": "CVE-2026-2762",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2762"
},
{
"cve": "CVE-2026-2763",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2763"
},
{
"cve": "CVE-2026-2764",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2764"
},
{
"cve": "CVE-2026-2765",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2765"
},
{
"cve": "CVE-2026-2766",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2766"
},
{
"cve": "CVE-2026-2767",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2767"
},
{
"cve": "CVE-2026-2768",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2768"
},
{
"cve": "CVE-2026-2769",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2769"
},
{
"cve": "CVE-2026-2770",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2770"
},
{
"cve": "CVE-2026-2771",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2771"
},
{
"cve": "CVE-2026-2772",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2772"
},
{
"cve": "CVE-2026-2773",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2773"
},
{
"cve": "CVE-2026-2774",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2774"
},
{
"cve": "CVE-2026-2775",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2775"
},
{
"cve": "CVE-2026-2776",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2776"
},
{
"cve": "CVE-2026-2777",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2777"
},
{
"cve": "CVE-2026-2778",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2778"
},
{
"cve": "CVE-2026-2779",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2779"
},
{
"cve": "CVE-2026-2780",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2780"
},
{
"cve": "CVE-2026-2781",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2781"
},
{
"cve": "CVE-2026-2782",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2782"
},
{
"cve": "CVE-2026-2783",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2783"
},
{
"cve": "CVE-2026-2784",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2784"
},
{
"cve": "CVE-2026-2785",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2785"
},
{
"cve": "CVE-2026-2786",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2786"
},
{
"cve": "CVE-2026-2787",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2787"
},
{
"cve": "CVE-2026-2788",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2788"
},
{
"cve": "CVE-2026-2789",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2789"
},
{
"cve": "CVE-2026-2790",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2790"
},
{
"cve": "CVE-2026-2791",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2791"
},
{
"cve": "CVE-2026-2792",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2792"
},
{
"cve": "CVE-2026-2793",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2793"
},
{
"cve": "CVE-2026-2794",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2794"
},
{
"cve": "CVE-2026-2795",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2795"
},
{
"cve": "CVE-2026-2796",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2796"
},
{
"cve": "CVE-2026-2797",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2797"
},
{
"cve": "CVE-2026-2798",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2798"
},
{
"cve": "CVE-2026-2799",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2799"
},
{
"cve": "CVE-2026-2800",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2800"
},
{
"cve": "CVE-2026-2801",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2801"
},
{
"cve": "CVE-2026-2802",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2802"
},
{
"cve": "CVE-2026-2803",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2803"
},
{
"cve": "CVE-2026-2804",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2804"
},
{
"cve": "CVE-2026-2805",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2805"
},
{
"cve": "CVE-2026-2806",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2806"
},
{
"cve": "CVE-2026-2807",
"product_status": {
"known_affected": [
"67646",
"T051137",
"T051136",
"T051139",
"T051138",
"T004914",
"T051133",
"T032255",
"T051135",
"2951",
"T002207",
"T017865",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-24T23:00:00.000+00:00",
"title": "CVE-2026-2807"
}
]
}
GHSA-GWGG-R543-4WVW
Vulnerability from github – Published: 2026-02-24 15:30 – Updated: 2026-02-25 18:31
VLAI?
Details
Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS < 147.4.
Severity ?
9.8 (Critical)
{
"affected": [],
"aliases": [
"CVE-2026-2634"
],
"database_specific": {
"cwe_ids": [
"CWE-451"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-24T14:16:23Z",
"severity": "CRITICAL"
},
"details": "Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4.",
"id": "GHSA-gwgg-r543-4wvw",
"modified": "2026-02-25T18:31:31Z",
"published": "2026-02-24T15:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2634"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1975529"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2026-12"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…