Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-2762— Integer overflow in the JavaScript: Standard Library component

EPSS 0.02% · P7
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-2762

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Integer overflow in the JavaScript: Standard Library component
Source: NVD (National Vulnerability Database)
Vulnerability Description
Integer overflow in the JavaScript: Standard Library component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mozilla多款产品 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mozilla Firefox等都是美国Mozilla基金会的产品。Mozilla Firefox是一款开源Web浏览器。Mozilla Firefox ESR是Firefox(Web浏览器)的一个延长支持版本。Mozilla Thunderbird是一套从Mozilla Application Suite独立出来的电子邮件客户端软件。 Mozilla多款产品存在输入验证错误漏洞,该漏洞源于JavaScript: Standard Library组件存在整数溢出。以下产品及版本受到影响:Firefox 1
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MozillaFirefox 140.8 ~ 140.* -
MozillaThunderbird 140.8 ~ 140.* -

II. Public POCs for CVE-2026-2762

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-2762

登录查看更多情报信息。

Same Patch Batch · Mozilla · 2026-02-24 · 52 CVEs total

CVE-2026-2773Incorrect boundary conditions in the Web Audio component
CVE-2026-2757Incorrect boundary conditions in the WebRTC: Audio/Video component
CVE-2026-2758Use-after-free in the JavaScript: GC component
CVE-2026-2763Use-after-free in the JavaScript Engine component
CVE-2026-2760Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component
CVE-2026-2761Sandbox escape in the Graphics: WebRender component
CVE-2026-2764JIT miscompilation, use-after-free in the JavaScript Engine: JIT component
CVE-2026-2759Incorrect boundary conditions in the Graphics: ImageLib component
CVE-2026-2771Undefined behavior in the DOM: Core & HTML component
CVE-2026-2772Use-after-free in the Audio/Video: Playback component
CVE-2026-2770Use-after-free in the DOM: Bindings (WebIDL) component
CVE-2026-2774Integer overflow in the Audio/Video component
CVE-2026-2775Mitigation bypass in the DOM: HTML Parser component
CVE-2026-2776Sandbox escape due to incorrect boundary conditions in the Telemetry component in External
CVE-2026-2777Privilege escalation in the Messaging System component
CVE-2026-2778Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component
CVE-2026-2779Incorrect boundary conditions in the Networking: JAR component
CVE-2026-2780Privilege escalation in the Netmonitor component
CVE-2026-2781Integer overflow in the Libraries component in NSS
CVE-2026-2782Privilege escalation in the Netmonitor component

Showing top 20 of 52 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-2762

No comments yet


Leave a comment