firefox

Direct Vulnerabilities

Known vulnerabilities in the firefox package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Integer Overflow or Wraparound

<149.0-r0
  • L
GHSA-qpjg-cffw-8m4r

<149.0-r0
  • L
GHSA-6q85-p5cm-28vf

<149.0-r0
  • C
CVE-2026-4710

<149.0-r0
  • L
GHSA-xh5h-c652-g9jr

<149.0-r0
  • C
CVE-2026-4692

<149.0-r0
  • L
GHSA-4pf4-jp4v-4g5c

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • C
CVE-2026-4717

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • H
Integer Overflow or Wraparound

<149.0-r0
  • L
GHSA-c3hv-rw36-5mgq

<149.0-r0
  • M
CVE-2026-4728

<149.0-r0
  • L
GHSA-px39-2r97-x6x6

<149.0-r0
  • L
CVE-2026-4720

<149.0-r0
  • H
CVE-2026-4727

<149.0-r0
  • L
GHSA-cm3f-xp4p-xgj7

<149.0-r0
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<149.0-r0
  • C
Use After Free

<149.0-r0
  • L
GHSA-h22r-8qx2-2mv3

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • H
CVE-2026-4712

<149.0-r0
  • L
GHSA-2qjw-h8g8-r86f

<149.0-r0
  • C
Use After Free

<149.0-r0
  • C
Use After Free

<149.0-r0
  • L
GHSA-mmvq-h6g9-8h39

<149.0-r0
  • L
GHSA-9r85-xf24-6724

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
GHSA-c97j-hmj5-572h

<149.0-r0
  • L
GHSA-5cgm-h8qg-5h77

<149.0-r0
  • C
CVE-2026-4705

<149.0-r0
  • L
GHSA-pm4j-pmqr-8gq4

<149.0-r0
  • C
Use of Uninitialized Resource

<149.0-r0
  • L
GHSA-hxpv-3x38-h8v5

<149.0-r0
  • L
GHSA-2mf6-25gq-26v8

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
GHSA-8768-346v-cvr2

<149.0-r0
  • C
Use After Free

<149.0-r0
  • L
GHSA-r7ww-hwqf-cqr6

<149.0-r0
  • L
GHSA-xr3f-844g-572f

<149.0-r0
  • C
Use After Free

<149.0-r0
  • C
Use After Free

<149.0-r0
  • L
GHSA-r67f-xmr7-94cc

<149.0-r0
  • C
CVE-2026-4724

<149.0-r0
  • L
CVE-2026-4729

<149.0-r0
  • L
GHSA-3rrq-fwhx-9wq4

<149.0-r0
  • C
Integer Overflow or Wraparound

<149.0-r0
  • L
GHSA-vxpv-c2h6-hq9v

<149.0-r0
  • L
GHSA-h895-88fj-h89r

<149.0-r0
  • L
GHSA-9979-85jw-xp9m

<149.0-r0
  • L
GHSA-8cfw-c9hx-8f9v

<149.0-r0
  • C
Use of Uninitialized Resource

<149.0-r0
  • L
GHSA-j97q-98f4-5wq3

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
GHSA-gw7x-g9xx-wmm2

<149.0-r0
  • L
GHSA-cr5g-9frg-q8m8

<149.0-r0
  • L
CVE-2026-4721

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • H
CVE-2026-4704

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
GHSA-mrrg-439g-x65p

<149.0-r0
  • L
GHSA-h6r3-p5gv-5qgc

<149.0-r0
  • L
GHSA-cj36-hxhv-2qxh

<149.0-r0
  • L
GHSA-7364-g429-cg4v

<149.0-r0
  • H
CVE-2026-4718

<149.0-r0
  • L
GHSA-6956-6r33-f8xw

<149.0-r0
  • L
GHSA-954r-qq48-9vr2

<149.0-r0
  • L
GHSA-vcpc-fv28-ppg5

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
GHSA-pqfx-cwf8-965q

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • C
Use After Free

<149.0-r0
  • L
GHSA-fmr6-7878-wx6p

<149.0-r0
  • L
GHSA-f58q-fr7j-32m6

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
GHSA-6hmc-rvh2-wxq3

<149.0-r0
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<149.0-r0
  • L
GHSA-x3f3-63g4-54j4

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
CVE-2026-4684

<149.0-r0
  • L
GHSA-mrxg-j2xh-wg8q

<149.0-r0
  • L
GHSA-8mgc-3hv6-4893

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • H
CVE-2026-4726

<149.0-r0
  • L
GHSA-xh4v-qr89-3hj3

<149.0-r0
  • L
GHSA-j5qx-hh9g-j6wj

<149.0-r0
  • H
Improper Check for Unusual or Exceptional Conditions

<149.0-r0
  • L
GHSA-2r77-x4qh-mhc3

<149.0-r0
  • L
CVE-2026-4722

<149.0-r0
  • C
CVE-2026-4700

<149.0-r0
  • L
CVE-2026-2447

<148.0-r0
  • L
GHSA-c99q-x737-hc5j

<148.0-r0
  • M
Information Exposure

<144.0.2-r0
  • L
GHSA-64x6-q8pq-xjmg

<144.0.2-r0
  • L
CVE-2025-49709

<139.0.4-r0
  • L
GHSA-64mp-f6ff-c8jm

<139.0.4-r0
  • L
GHSA-p5g7-573c-m74m

<139.0.4-r0
  • L
CVE-2025-49710

<139.0.4-r0
  • L
CVE-2025-5020

<139.0-r0
  • L
GHSA-7mfw-wgr7-m3jg

<139.0-r0
  • H
Access Restriction Bypass

<136.0.3-r0
  • C
Resource Management Errors

<136.0.3-r0
  • L
GHSA-vr58-2w95-qccf

<136.0.3-r0
  • L
GHSA-r373-c84r-h3c6

<136.0.3-r0
  • L
GHSA-v2j8-2q45-8jcq

<136.0.2-r0
  • L
GHSA-qph8-rvxf-5936

<136.0.2-r0
  • L
GHSA-rggh-rm3v-8xqj

<136.0.2-r0
  • L
GHSA-667m-43f5-gwwr

<136.0.2-r0
  • L
GHSA-r28p-rpv4-w54r

<136.0.2-r0
  • L
GHSA-99rj-hj9g-wrcv

<136.0.2-r0
  • H
CVE-2024-9399

<136.0.2-r0
  • L
CVE-2024-9391

<136.0.2-r0
  • M
Open Redirect

<136.0.2-r0
  • L
GHSA-qrmh-rjwm-6mq4

<136.0.2-r0
  • L
CVE-2024-9402

<136.0.2-r0
  • L
CVE-2024-9392

<136.0.2-r0
  • L
CVE-2024-9396

<136.0.2-r0
  • L
GHSA-hc6r-wpfc-q7m8

<136.0.2-r0
  • L
GHSA-3qpq-hc75-5535

<136.0.2-r0
  • M
CVE-2024-9398

<136.0.2-r0
  • L
CVE-2024-9403

<136.0.2-r0
  • H
CVE-2024-9394

<136.0.2-r0
  • L
CVE-2024-9400

<136.0.2-r0
  • L
GHSA-fc27-6qvc-xq94

<136.0.2-r0
  • L
GHSA-whq9-vwxq-6f23

<136.0.2-r0
  • L
GHSA-g76c-5vhc-hqmg

<136.0.2-r0
  • L
GHSA-vpgc-chc4-fq2j

<136.0.2-r0
  • H
CVE-2024-9393

<136.0.2-r0
  • M
Information Exposure

<136.0.2-r0
  • L
CVE-2024-9395

<136.0.2-r0
  • M
Improper Restriction of Rendered UI Layers or Frames

<136.0.2-r0
  • L
GHSA-8cw6-5qvp-q3wj

<136.0.2-r0
  • L
CVE-2024-9401

<136.0.2-r0
  • H
Improper Resource Shutdown or Release

<136.0.2-r0
  • L
GHSA-p5hw-4fxj-g4x6

<136.0.2-r0
  • L
GHSA-94mm-6r76-6pgh

<136.0.2-r0
  • L
GHSA-2ccw-r7qp-2p9j

<135.0-r0
  • H
CVE-2025-1011

<135.0-r0
  • M
Improper Restriction of Rendered UI Layers or Frames

<135.0-r0
  • L
GHSA-cj2j-jvqc-2vrv

<135.0-r0
  • H
Use After Free

<135.0-r0
  • L
CVE-2025-1013

<135.0-r0
  • L
GHSA-x7w4-wjh5-78hj

<135.0-r0
  • L
GHSA-v9m4-7h7v-vqrf

<135.0-r0
  • L
GHSA-v2xc-3r7v-9vrm

<135.0-r0
  • L
GHSA-3pgx-69pv-46wx

<135.0-r0
  • L
GHSA-f666-246m-p7mg

<135.0-r0
  • L
GHSA-gg39-4c5c-pfx2

<135.0-r0
  • C
Out-of-bounds Write

<135.0-r0
  • L
GHSA-qp3j-rxh4-q4h8

<135.0-r0
  • H
Use After Free

<135.0-r0
  • L
GHSA-mh3f-c34v-4q6q

<135.0-r0
  • M
Improper Restriction of Rendered UI Layers or Frames

<135.0-r0
  • H
Improper Certificate Validation

<135.0-r0
  • C
Out-of-bounds Write

<135.0-r0
  • C
Use After Free

<135.0-r0
  • C
Out-of-bounds Write

<135.0-r0
  • L
GHSA-hjjx-mmjm-vp9r

<135.0-r0
  • L
CVE-2025-0239

<134.0-r0
  • L
GHSA-928f-3rxq-5jvp

<134.0-r0
  • L
CVE-2025-0237

<134.0-r0
  • L
GHSA-f3xq-g93v-w8cv

<134.0-r0
  • L
Out-of-bounds Write

<134.0-r0
  • L
CVE-2025-0241

<134.0-r0
  • L
GHSA-2776-h8x3-vrr7

<134.0-r0
  • L
GHSA-24v2-mrj2-4wpc

<134.0-r0
  • L
GHSA-phcc-6pmp-qw9v

<134.0-r0
  • L
GHSA-qw28-p6qx-vj78

<134.0-r0
  • L
GHSA-68r8-f4jc-vc2p

<134.0-r0
  • L
CVE-2025-0245

<134.0-r0
  • L
CVE-2025-0240

<134.0-r0
  • L
GHSA-xwpw-pxrm-39pm

<134.0-r0
  • L
CVE-2025-0238

<134.0-r0
  • L
GHSA-2g52-qw8q-wfr9

<134.0-r0
  • L
GHSA-hh4j-jwjv-8726

<134.0-r0
  • L
Out-of-bounds Write

<134.0-r0
  • L
GHSA-p4q7-g7ff-823j

<134.0-r0
  • L
CVE-2025-0244

<134.0-r0
  • L
CVE-2025-0242

<134.0-r0
  • L
CVE-2025-0246

<134.0-r0
  • L
CVE-2024-11701

<133.0-r0
  • L
CVE-2024-11696

<133.0-r0
  • L
CVE-2024-11692

<133.0-r0
  • L
CVE-2024-11695

<133.0-r0
  • L
GHSA-mjcw-r3mg-3848

<133.0-r0
  • L
CVE-2024-11694

<133.0-r0
  • L
GHSA-wjq6-6xvc-xr82

<133.0-r0
  • L
CVE-2024-11708

<133.0-r0
  • L
GHSA-4c4w-pcg8-6hq9

<133.0-r0
  • L
GHSA-cpxj-fx45-9pgm

<133.0-r0
  • L
GHSA-8rq4-c5x2-x4g8

<133.0-r0
  • L
GHSA-h43c-gg33-qj9g

<133.0-r0
  • L
GHSA-qxf6-g9x3-8w74

<133.0-r0
  • L
CVE-2024-11697

<133.0-r0
  • L
GHSA-jxv2-pgjw-vg3v

<133.0-r0
  • L
CVE-2024-11702

<133.0-r0
  • L
CVE-2024-11691

<133.0-r0
  • L
GHSA-4jp9-q9g7-48gr

<133.0-r0
  • L
CVE-2024-11700

<133.0-r0
  • L
GHSA-3r9h-5xmh-8j4q

<133.0-r0
  • L
GHSA-845f-27fw-gjw9

<133.0-r0
  • L
CVE-2024-11706

<133.0-r0
  • L
GHSA-h8gv-f7pf-7c4p

<133.0-r0
  • L
CVE-2024-11693

<133.0-r0
  • L
GHSA-m59j-fmqm-3q93

<133.0-r0
  • L
CVE-2024-11703

<133.0-r0
  • L
CVE-2024-53976

<133.0-r0
  • L
CVE-2024-11698

<133.0-r0
  • L
CVE-2024-11699

<133.0-r0
  • L
GHSA-p9vw-xw86-3f2w

<133.0-r0
  • L
GHSA-g5wv-cvf4-2r98

<133.0-r0
  • L
GHSA-9g2q-259c-66mq

<133.0-r0
  • L
CVE-2024-53975

<133.0-r0
  • L
GHSA-7r4q-q89f-2mcg

<133.0-r0
  • L
CVE-2024-11705

<133.0-r0
  • L
CVE-2024-11704

<133.0-r0
  • L
GHSA-53mx-8hhc-gmp3

<133.0-r0
  • L
GHSA-rh22-rcv2-42x3

<133.0-r0
  • L
GHSA-6rc3-wcpj-59ch

<132.0-r0
  • M
Out-of-bounds Read

<132.0-r0
  • H
Out-of-bounds Write

<132.0-r0
  • L
GHSA-jx2m-9x57-vwr5

<132.0-r0
  • M
Authentication Bypass

<132.0-r0
  • L
GHSA-xhw3-h8gq-2w23

<132.0-r0
  • L
GHSA-77hv-rqc3-4gm6

<132.0-r0
  • L
GHSA-4jv6-884h-v282

<132.0-r0
  • M
Information Exposure

<132.0-r0
  • L
GHSA-9v98-vwhg-6x24

<132.0-r0
  • L
GHSA-679j-4q32-w85w

<132.0-r0
  • L
GHSA-87x3-r6f2-m885

<132.0-r0
  • M
Cross-site Scripting (XSS)

<132.0-r0
  • H
CVE-2024-10466

<132.0-r0
  • L
GHSA-r2v5-q2jv-5cff

<132.0-r0
  • L
GHSA-jv24-5j5x-m8w6

<132.0-r0
  • M
CVE-2024-10460

<132.0-r0
  • H
Use After Free

<132.0-r0
  • M
Authentication Bypass

<132.0-r0
  • H
CVE-2024-10458

<132.0-r0
  • L
CVE-2024-10004

<132.0-r0
  • L
GHSA-4wjh-chq6-qh88

<132.0-r0
  • L
GHSA-wh67-cc45-g7cf

<132.0-r0
  • M
Race Condition

<132.0-r0
  • L
CVE-2024-9936

<131.0.3-r0
  • L
GHSA-8c7g-vx5g-cmpg

<131.0.3-r0
  • M
Open Redirect

<130.0-r0
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<130.0-r0
  • L
GHSA-x565-97fv-jfr5

<130.0-r0
  • C
Out-of-bounds Write

<130.0-r0
  • C
Out-of-bounds Write

<130.0-r0
  • H
CVE-2024-8382

<130.0-r0
  • H
CVE-2024-8383

<130.0-r0
  • L
GHSA-pm7g-mpjq-33gr

<130.0-r0
  • L
GHSA-j755-mmjr-g7rh

<130.0-r0
  • C
Out-of-bounds Write

<130.0-r0
  • L
GHSA-m294-4vh4-9qwg

<130.0-r0
  • M
CVE-2024-8388

<130.0-r0
  • L
GHSA-p34f-6xg6-mcrp

<130.0-r0
  • L
GHSA-6q4m-8cmc-2222

<130.0-r0
  • L
GHSA-ph32-hgpc-r5j4

<130.0-r0
  • L
GHSA-j3m3-gfhr-jmqf

<130.0-r0
  • C
Access of Resource Using Incompatible Type ('Type Confusion')

<130.0-r0
  • L
GHSA-794f-5gfq-xmmq

<130.0-r0
  • L
GHSA-hj65-9wfc-jmf4

<130.0.1-r0
  • M
Open Redirect

<130.0.1-r0
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<129.0.2-r0
  • H
Use After Free

<129.0.2-r0
  • L
GHSA-563c-g7mm-g4xp

<129.0.2-r0
  • M
CVE-2024-7518

<129.0.2-r0
  • L
GHSA-3jj9-9269-99m2

<129.0.2-r0
  • L
GHSA-gx25-vx95-m52w

<129.0.2-r0
  • M
Use of Uninitialized Resource

<129.0.2-r0
  • H
Use After Free

<129.0.2-r0
  • L
GHSA-cr8r-7g9p-hcx6

<129.0.2-r0
  • L
GHSA-7jrj-xq8x-h553

<129.0.2-r0
  • L
GHSA-7j5g-jfh2-w58c

<129.0.2-r0
  • L
GHSA-7369-x5q2-rh2m

<129.0.2-r0
  • M
Cross-site Scripting (XSS)

<129.0.2-r0
  • M
Cross-site Scripting (XSS)

<129.0.2-r0
  • M
CVE-2024-7529

<129.0.2-r0
  • H
Use After Free

<129.0.2-r0
  • C
Out-of-bounds Write

<129.0.2-r0
  • L
GHSA-9wvx-3hw8-4ghf

<129.0.2-r0
  • L
GHSA-69x6-6jqx-q847

<129.0.2-r0
  • L
GHSA-7m9h-4qg6-4hmh

<129.0.2-r0
  • M
Cross-site Scripting (XSS)

<129.0.2-r0
  • L
GHSA-5x3f-3wg2-mc2h

<129.0.2-r0
  • H
Improper Handling of Exceptional Conditions

<129.0.2-r0
  • M
CVE-2024-7531

<129.0.2-r0
  • H
Out-of-bounds Read

<129.0.2-r0
  • H
Incorrect Default Permissions

<129.0.2-r0
  • L
GHSA-w3xp-69rr-q6gw

<129.0.2-r0
  • M
Cross-site Scripting (XSS)

<129.0.2-r0
  • L
GHSA-4xc3-7r7g-7vx3

<129.0.2-r0
  • H
CVE-2024-7523

<129.0.2-r0
  • L
GHSA-xmm2-x5jc-rvmh

<129.0.2-r0
  • L
GHSA-hf5v-h65q-2g27

<129.0.2-r0
  • L
GHSA-mcjx-2c4v-mvg9

<129.0.2-r0
  • L
GHSA-cr94-c6j4-q6g5

<129.0.2-r0
  • L
GHSA-j476-hf2q-984g

<128.0-r0
  • L
CVE-2024-6611

<128.0-r0
  • L
CVE-2024-6614

<128.0-r0
  • L
GHSA-v6r5-wp7h-cj77

<128.0-r0
  • L
CVE-2024-6612

<128.0-r0
  • M
CVE-2024-6608

<128.0-r0
  • L
GHSA-xcm3-jhmr-9fhh

<128.0-r0
  • M
CVE-2024-6610

<128.0-r0
  • L
CVE-2024-6605

<128.0-r0
  • L
GHSA-fj5c-r5jw-5wp8

<128.0-r0
  • L
GHSA-vr96-9xq4-q4jp

<128.0-r0
  • L
GHSA-cpfv-mr66-74v6

<128.0-r0
  • L
GHSA-h7q8-vff8-p3j8

<128.0-r0
  • L
CVE-2024-6607

<128.0-r0
  • L
GHSA-8c8x-848r-wqq7

<128.0-r0
  • H
CVE-2024-6609

<128.0-r0
  • L
CVE-2024-6613

<128.0-r0
  • L
GHSA-9vqr-5j64-p9wr

<128.0-r0
  • L
CVE-2024-6615

<128.0-r0
  • L
GHSA-cpm6-fp82-cq6m

<128.0-r0
  • L
GHSA-gq55-cjrv-p49j

<128.0-r0
  • L
CVE-2024-6600

<128.0-r0
  • L
CVE-2024-6602

<128.0-r0
  • L
CVE-2024-6604

<128.0-r0
  • L
GHSA-3wq7-w8r7-pmvh

<128.0-r0
  • L
CVE-2024-6603

<128.0-r0
  • L
CVE-2024-6606

<128.0-r0
  • L
GHSA-x2q3-f99c-25ff

<128.0-r0
  • L
CVE-2024-6601

<128.0-r0
  • L
GHSA-hr59-q2gm-7hrj

<128.0-r0
  • L
GHSA-rjwc-235r-8986

<128.0-r0
  • L
GHSA-r595-x79c-68p4

<128.0-r0
  • L
GHSA-frpv-8jj9-m3cv

<127.0.2-r0
  • L
CVE-2024-5688

<127.0.2-r0
  • L
GHSA-3jcf-9x2f-86h4

<127.0.2-r0
  • L
GHSA-gmgg-93h8-cp32

<127.0.2-r0
  • L
GHSA-4c8g-9w4h-h6xm

<127.0.2-r0
  • L
GHSA-xhxm-p3qv-qprc

<127.0.2-r0
  • L
GHSA-j6vm-3wj6-fwrh

<127.0.2-r0
  • H
Use After Free

<127.0.2-r0
  • L
GHSA-gfgx-4754-9hhp

<127.0.2-r0
  • M
CVE-2024-5691

<127.0.2-r0
  • L
GHSA-893r-mpwj-qhhg

<127.0.2-r0
  • M
CVE-2024-38312

<127.0.2-r0
  • L
CVE-2024-5687

<127.0.2-r0
  • C
Out-of-bounds Write

<127.0.2-r0
  • L
CVE-2024-5701

<127.0.2-r0
  • L
GHSA-6fj5-m574-p4w9

<127.0.2-r0
  • M
Improper Restriction of Rendered UI Layers or Frames

<127.0.2-r0
  • L
GHSA-g23m-h4v3-g2qq

<127.0.2-r0
  • L
CVE-2024-5696

<127.0.2-r0
  • L
GHSA-ffh4-92gv-qvv5

<127.0.2-r0
  • M
CVE-2024-5689

<127.0.2-r0
  • L
GHSA-f78g-xm2r-gm6j

<127.0.2-r0
  • L
GHSA-pqfc-h2m7-5p9p

<127.0.2-r0
  • L
GHSA-pq6v-hjqm-frww

<127.0.2-r0
  • L
CVE-2024-5692

<127.0.2-r0
  • L
CVE-2024-5699

<127.0.2-r0
  • L
GHSA-3fxj-qpxv-j6qj

<127.0.2-r0
  • M
Information Exposure

<127.0.2-r0
  • L
CVE-2024-5700

<127.0.2-r0
  • L
GHSA-pxf8-583j-3rmh

<127.0.2-r0
  • M
CVE-2024-5697

<127.0.2-r0
  • M
CVE-2024-38313

<127.0.2-r0
  • L
GHSA-hx83-hmj3-pffc

<127.0.2-r0
  • L
CVE-2024-5693

<127.0.2-r0