CVE-2026-6779
JavaScript Engine Vulnerability in Firefox 150 Causes Security Risk
Publication date: 2026-04-21
Last updated on: 2026-04-22
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | to 150.0 (exc) |
| mozilla | thunderbird | to 150.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
There is no information available regarding the effect of this vulnerability on compliance with standards such as GDPR or HIPAA.
How can this vulnerability impact me? :
The specific impacts of this vulnerability are not detailed in the provided information, so the exact consequences of exploitation are unknown.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability was fixed in Firefox 150. To mitigate this vulnerability, you should update your Firefox browser to version 150 or later.
Can you explain this vulnerability to me?
This vulnerability is an unspecified issue in the JavaScript Engine component of Mozilla Firefox. It was addressed and fixed in Firefox version 150.