Description
Multiple vulnerabilities were found in Mozilla Firefox. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- Use after free vulnerability can be exploited to cause denial of service or execute arbitrary code.
- An elevation of privilege vulnerability in Netmonitor can be exploited remotely to gain privileges.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Security vulnerability in Networking can be exploited to bypass security restrictions.
- A remote code execution vulnerability in DOM: Core & HTML component can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in JavaScript Engine can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in DOM: Window and Location can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in JavaScript: GC can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in DOM: Bindings (WebIDL) and Location can be exploited to cause denial of service or execute arbitrary code.
- Heap buffer overflow vulnerability in JavaScript: Standard Library can be exploited to cause denial of service.
- Information disclosure vulnerability in JIT can be exploited to obtain sensitive information.
- Heap buffer overflow vulnerability can be exploited to cause denial of service.
- Memory safety vulnerability can be exploited to execute arbitrary code.
- Security UI vulnerability can be exploited to spoof user interface.
- Security vulnerability can be exploited to bypass security restrictions.
- An elevation of privilege vulnerability can be exploited remotely to gain privileges.
Fiches de renseignement originales
Exploitation
Public exploits exist for this vulnerability.
Produits associés
Liste CVE
- CVE-2026-2757 critical
- CVE-2026-2758 critical
- CVE-2026-2759 critical
- CVE-2026-2760 critical
- CVE-2026-2761 critical
- CVE-2026-2762 critical
- CVE-2026-2763 critical
- CVE-2026-2764 critical
- CVE-2026-2765 critical
- CVE-2026-2766 critical
- CVE-2026-2767 critical
- CVE-2026-2768 critical
- CVE-2026-2769 critical
- CVE-2026-2770 critical
- CVE-2026-2771 critical
- CVE-2026-2772 critical
- CVE-2026-2773 critical
- CVE-2026-2774 critical
- CVE-2026-2775 critical
- CVE-2026-2776 critical
- CVE-2026-2777 critical
- CVE-2026-2778 critical
- CVE-2026-2779 critical
- CVE-2026-2780 critical
- CVE-2026-2781 critical
- CVE-2026-2782 critical
- CVE-2026-2783 critical
- CVE-2026-2784 critical
- CVE-2026-2785 critical
- CVE-2026-2786 critical
- CVE-2026-2787 critical
- CVE-2026-2788 critical
- CVE-2026-2789 critical
- CVE-2026-2790 critical
- CVE-2026-2791 critical
- CVE-2026-2792 critical
- CVE-2026-2793 critical
- CVE-2026-2794 critical
- CVE-2026-2795 critical
- CVE-2026-2796 critical
- CVE-2026-2797 critical
- CVE-2026-2798 critical
- CVE-2026-2799 critical
- CVE-2026-2800 critical
- CVE-2026-2801 critical
- CVE-2026-2802 warning
- CVE-2026-2803 critical
- CVE-2026-2804 high
- CVE-2026-2805 critical
- CVE-2026-2806 critical
- CVE-2026-2807 critical
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !