Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mozilla | Firefox | 140.7 ~ 140.* | - | |
| Mozilla | Thunderbird | 140.7 ~ 140.* | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-0877 | Mitigation bypass in the DOM: Security component | |
| CVE-2026-0878 | Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component | |
| CVE-2026-0879 | Sandbox escape due to incorrect boundary conditions in the Graphics component | |
| CVE-2026-0881 | Sandbox escape in the Messaging System component | |
| CVE-2026-0880 | Sandbox escape due to integer overflow in the Graphics component | |
| CVE-2026-0883 | Information disclosure in the Networking component | |
| CVE-2026-0882 | Use-after-free in the IPC component | |
| CVE-2026-0886 | Incorrect boundary conditions in the Graphics component | |
| CVE-2026-0884 | Use-after-free in the JavaScript Engine component | |
| CVE-2026-0887 | Clickjacking issue, information disclosure in the PDF Viewer component | |
| CVE-2026-0888 | Information disclosure in the XML component | |
| CVE-2026-0890 | Spoofing issue in the DOM: Copy & Paste and Drag & Drop component | |
| CVE-2026-0889 | Denial-of-service in the DOM: Service Workers component | |
| CVE-2026-0891 | Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thun | |
| CVE-2026-0892 | Memory safety bugs fixed in Firefox 147 and Thunderbird 147 |
No comments yet