Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities

Mozilla has released Firefox 150, addressing 41 security vulnerabilities, including multiple high-severity flaws that could allow remote code execution (RCE).

The update focuses heavily on fixing memory safety issues such as use-after-free and uninitialized memory bugs, which are commonly exploited by attackers to gain control over systems.

Security experts strongly recommend users update immediately, as several of these vulnerabilities can be triggered through malicious web content, making them highly exploitable in real-world scenarios.

Critical Vulnerabilities Overview

Among the most severe issues are two high-risk use-after-free vulnerabilities:

  • CVE-2026-6746 in the DOM (Core & HTML) component
  • CVE-2026-6747 in the WebRTC component

These flaws occur when freed memory is accessed incorrectly, potentially enabling attackers to execute arbitrary code or crash the browser.

Such bugs are particularly dangerous because they can be exploited simply by convincing a user to visit a malicious webpage.

Other high-severity vulnerabilities include memory corruption issues in Web Codecs, Canvas2D, and WebRender, as well as privilege escalation flaws that could allow attackers to break out of browser sandboxes.

Interestingly, Mozilla noted that security researchers used AI tools, including Anthropic’s Claude, to help identify some of these complex vulnerabilities, highlighting the growing role of AI in vulnerability research.

CVE IDVulnerability DescriptionImpact
CVE-2026-6746Use-after-free in the DOM: Core & HTML componentHigh 
CVE-2026-6747Use-after-free in the WebRTC componentHigh 
CVE-2026-6748Uninitialized memory in the Audio/Video: Web Codecs componentHigh 
CVE-2026-6749Information disclosure due to uninitialized memory in Graphics: Canvas2DHigh 
CVE-2026-6750Privilege escalation in the Graphics: WebRender componentHigh 
CVE-2026-6751Uninitialized memory in the Audio/Video: Web Codecs componentHigh 
CVE-2026-6752Incorrect boundary conditions in the WebRTC componentHigh 
CVE-2026-6753Incorrect boundary conditions in the WebRTC componentHigh 
CVE-2026-6754Use-after-free in the JavaScript Engine componentHigh 
CVE-2026-6755Mitigation bypass in the DOM: postMessage componentModerate 
CVE-2026-6756Mitigation bypass in Firefox for AndroidModerate 
CVE-2026-6757Invalid pointer in the JavaScript: WebAssembly componentModerate 
CVE-2026-6758Use-after-free in the JavaScript: WebAssembly componentModerate 
CVE-2026-6759Use-after-free in the Widget: Cocoa componentModerate 
CVE-2026-6760Mitigation bypass in the Networking: Cookies componentModerate 
CVE-2026-6761Privilege escalation in the Networking componentModerate 
CVE-2026-6762Spoofing issue in the DOM: Core & HTML componentModerate 
CVE-2026-6763Mitigation bypass in the File Handling componentModerate 
CVE-2026-6764Incorrect boundary conditions in the DOM: Device Interfaces componentModerate 
CVE-2026-6765Information disclosure in the Form Autofill componentModerate 
CVE-2026-6766Incorrect boundary conditions in the Libraries component in NSSModerate 
CVE-2026-6767Other issue in the Libraries component in NSSModerate 
CVE-2026-6768Mitigation bypass in the Networking: Cookies componentModerate 
CVE-2026-6769Privilege escalation in the Debugger componentModerate 
CVE-2026-6770Other issue in the Storage: IndexedDB componentModerate 
CVE-2026-6771Mitigation bypass in the DOM: Security componentModerate 
CVE-2026-6772Incorrect boundary conditions in the Libraries component in NSSModerate 
CVE-2026-6773Denial-of-service due to integer overflow in Graphics: WebGPULow 
CVE-2026-6774Mitigation bypass in the DOM: Security componentLow 
CVE-2026-6775Incorrect boundary conditions in the WebRTC componentLow 
CVE-2026-6776Incorrect boundary conditions in the WebRTC: Networking componentLow 
CVE-2026-6777Other issue in the Networking: DNS componentLow 
CVE-2026-6778Invalid pointer in the Audio/Video: Playback componentLow 
CVE-2026-6779Other issue in the JavaScript Engine componentLow 
CVE-2026-6780Denial-of-service in the Audio/Video: Playback componentLow 
CVE-2026-6781Denial-of-service in the Audio/Video: Playback componentLow 
CVE-2026-6782Information disclosure in the IP Protection componentLow 
CVE-2026-6783Incorrect boundary conditions/integer overflow in Audio/Video: PlaybackLow 
CVE-2026-6784Memory safety bugs fixed in Firefox 150 and Thunderbird 150High 
CVE-2026-6785Memory safety bugs fixed in ESR 115.35, ESR 140.10, and Firefox 150High 
CVE-2026-6786Memory safety bugs fixed in ESR 140.10 and Firefox 150High 

Users should update to Firefox 150 immediately via the browser’s automatic update feature or by downloading the latest version from Mozilla’s official site.

Organizations are advised to prioritize patch deployment, especially in environments where browsers are frequently exposed to untrusted content.

This release highlights the continued risk posed by memory safety issues and the importance of rapid patching to defend against evolving web-based attacks.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading