
[CIVN-2026-0203] Multiple Vulnerabilities in Mozilla Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Mozilla Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Mozilla Firefox versions prior to 150
Mozilla Firefox ESR versions prior to 115.35
Mozilla Firefox ESR versions prior to 140.10
Mozilla Thunderbird versions prior to 140.10
Mozilla Thunderbird versions prior to 150
Overview
Multiple vulnerabilities have been reported in Mozilla products which could be exploited by a remote attacker to exe-cute arbitrary code, perform spoofing attack, bypass security restriction or cause Denial of service (DoS) condition on the targeted system.
Target Audience:
All end-user organizations and individuals using Mozilla Products.
Risk Assessment:
High risk of unauthorized access to sensitive information.
Impact Assessment:
Potential for data theft, sensitive information disclosure and complete compromise of system.
Description
Mozilla Firefox is a free and open-source web browser developed by Mozilla foundation, while Firefox ESR (Extended support Release) is a stable version tailored for organizations that re-quire long-term support with only security and maintenance updates.
Multiple vulnerabilities exist in Mozilla products due to Use-after-free in the DOM: Core & HTML component, WebRTC component, JavaScript Engine component, Widget: Cocoa component, JavaScript: WebAssembly component; Incorrect boundary conditions in the WebRTC component, Libraries component in NSS, DOM: Device Interfaces component, WebRTC: Networking component; Mitigation bypass in the file handling component, DOM: Security component, DOM: postMessage component, Networking: Cookies component and Memory safety bugs. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, perform spoofing attack, bypass security restriction or cause Denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-31/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-32/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-33/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-34/
References
Mozilla
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-31/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-32/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-33/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-34/
CVE Name
CVE-2026-2781
CVE-2026-6746
CVE-2026-6747
CVE-2026-6748
CVE-2026-6749
CVE-2026-6750
CVE-2026-6751
CVE-2026-6752
CVE-2026-6753
CVE-2026-6754
CVE-2026-6755
CVE-2026-6756
CVE-2026-6757
CVE-2026-6758
CVE-2026-6759
CVE-2026-6760
CVE-2026-6761
CVE-2026-6762
CVE-2026-6763
CVE-2026-6764
CVE-2026-6765
CVE-2026-6766
CVE-2026-6767
CVE-2026-6768
CVE-2026-6769
CVE-2026-6770
CVE-2026-6771
CVE-2026-6772
CVE-2026-6773
CVE-2026-6774
CVE-2026-6775
CVE-2026-6776
CVE-2026-6777
CVE-2026-6778
CVE-2026-6779
CVE-2026-6780
CVE-2026-6781
CVE-2026-6782
CVE-2026-6783
CVE-2026-6784
CVE-2026-6785
CVE-2026-6786
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=YXJ4
—–END PGP SIGNATURE—–


