Search criteria
2358 vulnerabilities
CVE-2026-2807 (GCVE-0-2026-2807)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Memory safety bugs fixed in Firefox 148 and Thunderbird 148
Summary
Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Agi Sferro, Andrew McCreight, Randell Jesup, Tom Schuster
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Agi Sferro, Andrew McCreight, Randell Jesup, Tom Schuster"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:46.576Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "Memory safety bugs fixed in Firefox 148 and Thunderbird 148",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1756056%2C1999402%2C2004872%2C2006037%2C2012855"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Memory safety bugs fixed in Firefox 148 and Thunderbird 148"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2807",
"datePublished": "2026-02-24T13:33:34.035Z",
"dateReserved": "2026-02-19T15:07:07.640Z",
"dateUpdated": "2026-02-24T17:30:46.576Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2806 (GCVE-0-2026-2806)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Uninitialized memory in the Graphics: Text component
Summary
Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Zijie Zhao
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Zijie Zhao"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:46.157Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2006199"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Uninitialized memory in the Graphics: Text component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2806",
"datePublished": "2026-02-24T13:33:33.407Z",
"dateReserved": "2026-02-19T15:07:05.634Z",
"dateUpdated": "2026-02-24T17:30:46.157Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2805 (GCVE-0-2026-2805)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Invalid pointer in the DOM: Core & HTML component
Summary
Invalid pointer in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Invalid pointer in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Invalid pointer in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:45.766Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2014549"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Invalid pointer in the DOM: Core \u0026 HTML component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2805",
"datePublished": "2026-02-24T13:33:32.768Z",
"dateReserved": "2026-02-19T15:07:03.616Z",
"dateUpdated": "2026-02-24T17:30:45.766Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2804 (GCVE-0-2026-2804)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Use-after-free in the JavaScript: WebAssembly component
Summary
Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
5.4 (Medium)
CWE
- CWE-416 - Use After Free
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Information to follow
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-2804",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-24T15:55:39.007594Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T15:56:04.804Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:44.942Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2013584"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Use-after-free in the JavaScript: WebAssembly component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2804",
"datePublished": "2026-02-24T13:33:32.144Z",
"dateReserved": "2026-02-19T15:07:01.585Z",
"dateUpdated": "2026-02-24T17:30:44.942Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2803 (GCVE-0-2026-2803)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Information disclosure, mitigation bypass in the Settings UI component
Summary
Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Skywarp
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Skywarp"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:44.561Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2012012"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Information disclosure, mitigation bypass in the Settings UI component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2803",
"datePublished": "2026-02-24T13:33:31.491Z",
"dateReserved": "2026-02-19T15:06:58.944Z",
"dateUpdated": "2026-02-24T17:30:44.561Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2802 (GCVE-0-2026-2802)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Race condition in the JavaScript: GC component
Summary
Race condition in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
4.2 (Medium)
CWE
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Gary Kwong
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-2802",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-24T15:56:29.941950Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T15:56:58.815Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Gary Kwong"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Race condition in the JavaScript: GC component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Race condition in the JavaScript: GC component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:44.158Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2011069"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Race condition in the JavaScript: GC component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2802",
"datePublished": "2026-02-24T13:33:30.784Z",
"dateReserved": "2026-02-19T15:06:56.714Z",
"dateUpdated": "2026-02-24T17:30:44.158Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2801 (GCVE-0-2026-2801)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Incorrect boundary conditions in the JavaScript: WebAssembly component
Summary
Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Kanaru Sato
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Kanaru Sato"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:43.776Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2009901"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Incorrect boundary conditions in the JavaScript: WebAssembly component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2801",
"datePublished": "2026-02-24T13:33:29.929Z",
"dateReserved": "2026-02-19T15:06:54.497Z",
"dateUpdated": "2026-02-24T17:30:43.776Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2800 (GCVE-0-2026-2800)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Spoofing issue in the WebAuthn component in Firefox for Android
Summary
Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
hafiizh & kang ali
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "hafiizh \u0026 kang ali"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:43.309Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1988145"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Spoofing issue in the WebAuthn component in Firefox for Android"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2800",
"datePublished": "2026-02-24T13:33:29.312Z",
"dateReserved": "2026-02-19T15:06:52.343Z",
"dateUpdated": "2026-02-24T17:30:43.309Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2799 (GCVE-0-2026-2799)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Use-after-free in the DOM: Core & HTML component
Summary
Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Use-after-free in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:42.844Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2014551"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Use-after-free in the DOM: Core \u0026 HTML component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2799",
"datePublished": "2026-02-24T13:33:28.665Z",
"dateReserved": "2026-02-19T15:06:49.658Z",
"dateUpdated": "2026-02-24T17:30:42.844Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2798 (GCVE-0-2026-2798)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 18:25
VLAI?
Title
Use-after-free in the DOM: Core & HTML component
Summary
Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
8.8 (High)
CWE
- CWE-416 - Use After Free
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Sajeeb Lohani
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-2798",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-24T18:24:51.747768Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T18:25:31.688Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Sajeeb Lohani"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Use-after-free in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:42.470Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2014136"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Use-after-free in the DOM: Core \u0026 HTML component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2798",
"datePublished": "2026-02-24T13:33:28.034Z",
"dateReserved": "2026-02-19T15:06:47.628Z",
"dateUpdated": "2026-02-24T18:25:31.688Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2797 (GCVE-0-2026-2797)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Use-after-free in the JavaScript: GC component
Summary
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:42.064Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2013561"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Use-after-free in the JavaScript: GC component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2797",
"datePublished": "2026-02-24T13:33:27.406Z",
"dateReserved": "2026-02-19T15:06:45.386Z",
"dateUpdated": "2026-02-24T17:30:42.064Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2796 (GCVE-0-2026-2796)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
JIT miscompilation in the JavaScript: WebAssembly component
Summary
JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:41.643Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2013165"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "JIT miscompilation in the JavaScript: WebAssembly component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2796",
"datePublished": "2026-02-24T13:33:26.775Z",
"dateReserved": "2026-02-19T15:06:43.289Z",
"dateUpdated": "2026-02-24T17:30:41.643Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2795 (GCVE-0-2026-2795)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Use-after-free in the JavaScript: GC component
Summary
Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||
|
|||||||||
Credits
x0e
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "x0e"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"value": "Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox \u003c 148 and Thunderbird \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:41.221Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2010940"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
}
],
"title": "Use-after-free in the JavaScript: GC component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2795",
"datePublished": "2026-02-24T13:33:26.111Z",
"dateReserved": "2026-02-19T15:06:41.117Z",
"dateUpdated": "2026-02-24T17:30:41.221Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2794 (GCVE-0-2026-2794)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 13:33
VLAI?
Title
Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android
Summary
Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android. This vulnerability affects Firefox < 148.
Severity ?
No CVSS data available.
Assigner
References
Credits
stevej
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "stevej"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android. This vulnerability affects Firefox \u003c 148."
}
],
"value": "Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android. This vulnerability affects Firefox \u003c 148."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T13:33:25.399Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2008365"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
}
],
"title": "Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2794",
"datePublished": "2026-02-24T13:33:25.399Z",
"dateReserved": "2026-02-19T15:06:38.903Z",
"dateUpdated": "2026-02-24T13:33:25.399Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2634 (GCVE-0-2026-2634)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 13:33
VLAI?
Title
Spoofed web content presented under trusted domains using scripted navigation on Firefox iOS
Summary
Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS < 147.4.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Mozilla | Firefox for iOS |
Affected:
unspecified , < 147.4
(custom)
|
Credits
Renwa
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox for iOS",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "147.4",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Renwa"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4."
}
],
"value": "Malicious scripts could cause desynchronization between the address bar and web content before a response is received in Firefox iOS, allowing attacker-controlled pages to be presented under spoofed domains. This vulnerability affects Firefox for iOS \u003c 147.4."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T13:33:24.725Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1975529"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-12/"
}
],
"title": "Spoofed web content presented under trusted domains using scripted navigation on Firefox iOS"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2634",
"datePublished": "2026-02-24T13:33:24.725Z",
"dateReserved": "2026-02-17T18:31:35.581Z",
"dateUpdated": "2026-02-24T13:33:24.725Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2793 (GCVE-0-2026-2793)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
Summary
Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
Credits
Andrew McCreight, Christian Holler
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "115.33",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Andrew McCreight, Christian Holler"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:40.827Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=2015196%2C2016423%2C2016498"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-14/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2793",
"datePublished": "2026-02-24T13:33:23.571Z",
"dateReserved": "2026-02-19T15:06:38.377Z",
"dateUpdated": "2026-02-24T17:30:40.827Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2792 (GCVE-0-2026-2792)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
Summary
Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Andrew McCreight, Maurice Dauer, Olli Pettay, Ryan Hunt
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Andrew McCreight, Maurice Dauer, Olli Pettay, Ryan Hunt"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:40.473Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148",
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=2008912%2C2010050%2C2010275%2C2012331"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2792",
"datePublished": "2026-02-24T13:33:22.842Z",
"dateReserved": "2026-02-19T15:06:37.841Z",
"dateUpdated": "2026-02-24T17:30:40.473Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2791 (GCVE-0-2026-2791)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Mitigation bypass in the Networking: Cache component
Summary
Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:40.073Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2015220"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Mitigation bypass in the Networking: Cache component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2791",
"datePublished": "2026-02-24T13:33:22.237Z",
"dateReserved": "2026-02-19T15:06:35.590Z",
"dateUpdated": "2026-02-24T17:30:40.073Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2790 (GCVE-0-2026-2790)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Same-origin policy bypass in the Networking: JAR component
Summary
Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Surya Dev Singh
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Surya Dev Singh"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:39.461Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2008426"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Same-origin policy bypass in the Networking: JAR component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2790",
"datePublished": "2026-02-24T13:33:21.600Z",
"dateReserved": "2026-02-19T15:06:33.357Z",
"dateUpdated": "2026-02-24T17:30:39.461Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2789 (GCVE-0-2026-2789)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Use-after-free in the Graphics: ImageLib component
Summary
Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "115.33",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:39.046Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2015179"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-14/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Use-after-free in the Graphics: ImageLib component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2789",
"datePublished": "2026-02-24T13:33:20.961Z",
"dateReserved": "2026-02-19T15:06:31.096Z",
"dateUpdated": "2026-02-24T17:30:39.046Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2788 (GCVE-0-2026-2788)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Incorrect boundary conditions in the Audio/Video: GMP component
Summary
Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "115.33",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:38.598Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2014824"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-14/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Incorrect boundary conditions in the Audio/Video: GMP component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2788",
"datePublished": "2026-02-24T13:33:20.287Z",
"dateReserved": "2026-02-19T15:06:29.079Z",
"dateUpdated": "2026-02-24T17:30:38.598Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2787 (GCVE-0-2026-2787)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Use-after-free in the DOM: Window and Location component
Summary
Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "115.33",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:38.135Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2014560"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-14/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Use-after-free in the DOM: Window and Location component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2787",
"datePublished": "2026-02-24T13:33:19.579Z",
"dateReserved": "2026-02-19T15:06:26.851Z",
"dateUpdated": "2026-02-24T17:30:38.135Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2786 (GCVE-0-2026-2786)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Use-after-free in the JavaScript Engine component
Summary
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:37.620Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2013612"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Use-after-free in the JavaScript Engine component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2786",
"datePublished": "2026-02-24T13:33:18.980Z",
"dateReserved": "2026-02-19T15:06:24.424Z",
"dateUpdated": "2026-02-24T17:30:37.620Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2785 (GCVE-0-2026-2785)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Invalid pointer in the JavaScript Engine component
Summary
Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Information to follow
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Information to follow"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:37.096Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2013549"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Invalid pointer in the JavaScript Engine component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2785",
"datePublished": "2026-02-24T13:33:18.254Z",
"dateReserved": "2026-02-19T15:06:21.995Z",
"dateUpdated": "2026-02-24T17:30:37.096Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2784 (GCVE-0-2026-2784)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Mitigation bypass in the DOM: Security component
Summary
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
D. Santos
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "D. Santos"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:36.359Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2012984"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Mitigation bypass in the DOM: Security component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2784",
"datePublished": "2026-02-24T13:33:17.554Z",
"dateReserved": "2026-02-19T15:06:19.739Z",
"dateUpdated": "2026-02-24T17:30:36.359Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2783 (GCVE-0-2026-2783)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component
Summary
Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
x0e
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "x0e"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:35.131Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2010943"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2783",
"datePublished": "2026-02-24T13:33:16.921Z",
"dateReserved": "2026-02-19T15:06:17.478Z",
"dateUpdated": "2026-02-24T17:30:35.131Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2782 (GCVE-0-2026-2782)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Privilege escalation in the Netmonitor component
Summary
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Cody
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Cody"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Privilege escalation in the Netmonitor component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Privilege escalation in the Netmonitor component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:33.383Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2010743"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Privilege escalation in the Netmonitor component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2782",
"datePublished": "2026-02-24T13:33:16.262Z",
"dateReserved": "2026-02-19T15:06:15.435Z",
"dateUpdated": "2026-02-24T17:30:33.383Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2781 (GCVE-0-2026-2781)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Integer overflow in the Libraries component in NSS
Summary
Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Clay Ver Valen
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Clay Ver Valen"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:32.527Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2009552"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Integer overflow in the Libraries component in NSS"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2781",
"datePublished": "2026-02-24T13:33:15.551Z",
"dateReserved": "2026-02-19T15:06:13.592Z",
"dateUpdated": "2026-02-24T17:30:32.527Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2780 (GCVE-0-2026-2780)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Privilege escalation in the Netmonitor component
Summary
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
RyotaK
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "RyotaK"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Privilege escalation in the Netmonitor component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Privilege escalation in the Netmonitor component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:31.960Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2007829"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Privilege escalation in the Netmonitor component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2780",
"datePublished": "2026-02-24T13:33:14.850Z",
"dateReserved": "2026-02-19T15:06:11.352Z",
"dateUpdated": "2026-02-24T17:30:31.960Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-2779 (GCVE-0-2026-2779)
Vulnerability from cvelistv5 – Published: 2026-02-24 13:33 – Updated: 2026-02-24 17:30
VLAI?
Title
Incorrect boundary conditions in the Networking: JAR component
Summary
Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 148
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Alex Mayorga
{
"containers": {
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "148",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "140.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Alex Mayorga"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"value": "Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-24T17:30:31.538Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1164141"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-13/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-15/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2026-17/"
}
],
"title": "Incorrect boundary conditions in the Networking: JAR component"
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2026-2779",
"datePublished": "2026-02-24T13:33:14.195Z",
"dateReserved": "2026-02-19T15:06:08.909Z",
"dateUpdated": "2026-02-24T17:30:31.538Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}