CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs May 06, 2026

Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities - cyberpress.org

cyberpress.org Archived May 06, 2026 ✓ Full text saved

Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities cyberpress.org

Full text archived locally
✦ AI Summary · Claude Sonnet


    Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities By AnuPriya April 22, 2026 Categories: Cyber Security News Mozilla has released Firefox 150, addressing 41 security vulnerabilities, including multiple high-severity flaws that could allow remote code execution (RCE). The update focuses heavily on fixing memory safety issues such as use-after-free and uninitialized memory bugs, which are commonly exploited by attackers to gain control over systems. Security experts strongly recommend users update immediately, as several of these vulnerabilities can be triggered through malicious web content, making them highly exploitable in real-world scenarios. Critical Vulnerabilities Overview Among the most severe issues are two high-risk use-after-free vulnerabilities: CVE-2026-6746 in the DOM (Core & HTML) component CVE-2026-6747 in the WebRTC component These flaws occur when freed memory is accessed incorrectly, potentially enabling attackers to execute arbitrary code or crash the browser. Such bugs are particularly dangerous because they can be exploited simply by convincing a user to visit a malicious webpage. Other high-severity vulnerabilities include memory corruption issues in Web Codecs, Canvas2D, and WebRender, as well as privilege escalation flaws that could allow attackers to break out of browser sandboxes. Interestingly, Mozilla noted that security researchers used AI tools, including Anthropic’s Claude, to help identify some of these complex vulnerabilities, highlighting the growing role of AI in vulnerability research. CVE ID Vulnerability Description Impact CVE-2026-6746 Use-after-free in the DOM: Core & HTML component High  CVE-2026-6747 Use-after-free in the WebRTC component High  CVE-2026-6748 Uninitialized memory in the Audio/Video: Web Codecs component High  CVE-2026-6749 Information disclosure due to uninitialized memory in Graphics: Canvas2D High  CVE-2026-6750 Privilege escalation in the Graphics: WebRender component High  CVE-2026-6751 Uninitialized memory in the Audio/Video: Web Codecs component High  CVE-2026-6752 Incorrect boundary conditions in the WebRTC component High  CVE-2026-6753 Incorrect boundary conditions in the WebRTC component High  CVE-2026-6754 Use-after-free in the JavaScript Engine component High  CVE-2026-6755 Mitigation bypass in the DOM: postMessage component Moderate  CVE-2026-6756 Mitigation bypass in Firefox for Android Moderate  CVE-2026-6757 Invalid pointer in the JavaScript: WebAssembly component Moderate  CVE-2026-6758 Use-after-free in the JavaScript: WebAssembly component Moderate  CVE-2026-6759 Use-after-free in the Widget: Cocoa component Moderate  CVE-2026-6760 Mitigation bypass in the Networking: Cookies component Moderate  CVE-2026-6761 Privilege escalation in the Networking component Moderate  CVE-2026-6762 Spoofing issue in the DOM: Core & HTML component Moderate  CVE-2026-6763 Mitigation bypass in the File Handling component Moderate  CVE-2026-6764 Incorrect boundary conditions in the DOM: Device Interfaces component Moderate  CVE-2026-6765 Information disclosure in the Form Autofill component Moderate  CVE-2026-6766 Incorrect boundary conditions in the Libraries component in NSS Moderate  CVE-2026-6767 Other issue in the Libraries component in NSS Moderate  CVE-2026-6768 Mitigation bypass in the Networking: Cookies component Moderate  CVE-2026-6769 Privilege escalation in the Debugger component Moderate  CVE-2026-6770 Other issue in the Storage: IndexedDB component Moderate  CVE-2026-6771 Mitigation bypass in the DOM: Security component Moderate  CVE-2026-6772 Incorrect boundary conditions in the Libraries component in NSS Moderate  CVE-2026-6773 Denial-of-service due to integer overflow in Graphics: WebGPU Low  CVE-2026-6774 Mitigation bypass in the DOM: Security component Low  CVE-2026-6775 Incorrect boundary conditions in the WebRTC component Low  CVE-2026-6776 Incorrect boundary conditions in the WebRTC: Networking component Low  CVE-2026-6777 Other issue in the Networking: DNS component Low  CVE-2026-6778 Invalid pointer in the Audio/Video: Playback component Low  CVE-2026-6779 Other issue in the JavaScript Engine component Low  CVE-2026-6780 Denial-of-service in the Audio/Video: Playback component Low  CVE-2026-6781 Denial-of-service in the Audio/Video: Playback component Low  CVE-2026-6782 Information disclosure in the IP Protection component Low  CVE-2026-6783 Incorrect boundary conditions/integer overflow in Audio/Video: Playback Low  CVE-2026-6784 Memory safety bugs fixed in Firefox 150 and Thunderbird 150 High  CVE-2026-6785 Memory safety bugs fixed in ESR 115.35, ESR 140.10, and Firefox 150 High  CVE-2026-6786 Memory safety bugs fixed in ESR 140.10 and Firefox 150 High  Users should update to Firefox 150 immediately via the browser’s automatic update feature or by downloading the latest version from Mozilla’s official site. Organizations are advised to prioritize patch deployment, especially in environments where browsers are frequently exposed to untrusted content. This release highlights the continued risk posed by memory safety issues and the importance of rapid patching to defend against evolving web-based attacks. Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google Share Facebook Twitter Pinterest WhatsApp AnuPriya Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends. Recent Articles DAEMON Tools Breach Used to Spread Malware in Supply Chain Attack Cyber Security News May 5, 2026 Critical Weaver E-cology RCE Flaw Actively Exploited by Attackers Cyber Security News May 5, 2026 ScarCruft Supply Chain Attack Targets Gaming Platform Users APT May 5, 2026 Cisco Acquires Astrix Security to Boost AI Agent and Machine Identity Protection Cyber Security News May 5, 2026 WhatsApp Flaw Lets Attackers Use Instagram Reels to Trigger Malicious URLs Cyber Security News May 5, 2026 Related Stories Cyber Security News DAEMON Tools Breach Used to Spread Malware in Supply Chain Attack AnuPriya - May 5, 2026 Cyber Security News Critical Weaver E-cology RCE Flaw Actively Exploited by Attackers AnuPriya - May 5, 2026 APT ScarCruft Supply Chain Attack Targets Gaming Platform Users Varshini - May 5, 2026 Cyber Security News Cisco Acquires Astrix Security to Boost AI Agent and Machine Identity Protection AnuPriya - May 5, 2026 Cyber Security News WhatsApp Flaw Lets Attackers Use Instagram Reels to Trigger Malicious URLs AnuPriya - May 5, 2026 APT SHADOW-EARTH-053 Deploys ShadowPad Through Exchange Server Exploits Varshini - May 5, 2026 LEAVE A REPLY Comment: Name:* Email:* Website:
    💬 Team Notes
    Article Info
    Source
    cyberpress.org
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    May 06, 2026
    Archived
    May 06, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗