{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"firefox security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for firefox is now available for openEuler-22.03-LTS-SP4",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability. %if 0 %global moz_debug_prefix /lib/debug %global moz_debug_dir /lib/debug/ %global uname_m %(uname -m) %global symbols_file_name -.en-US.-%(uname.crashreporter-symbols.zip %global symbols_file_path /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip %global _find_debuginfo_opts -p /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip -o debugcrashreporter.list %global crashreporter_pkg_name mozilla-crashreporter--debuginfo\n\nSecurity Fix(es):\n\nHeap buffer overflow vulnerability exists in libvpx component. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, and Firefox ESR < 115.32.1.(CVE-2026-2447)\n\nIncorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2757)\n\nUse-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2758)\n\nIncorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2759)\n\nSandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2760)\n\nSandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2761)\n\nInteger overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2762)\n\nUse-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2763)\n\nJIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2764)\n\nUse-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2765)\n\nUse-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2766)\n\nUse-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2767)\n\nSandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2768)\n\nA use-after-free vulnerability exists in the Storage: IndexedDB component of Mozilla Firefox, Firefox ESR, and Thunderbird. This vulnerability occurs when the program continues to reference a memory area after it has been freed, which can lead to program crashes, the use of unexpected values, or the execution of arbitrary code. This vulnerability poses a threat to confidentiality, integrity, and availability.(CVE-2026-2769)\n\nUse-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2770)\n\nUndefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2771)\n\nUse-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2772)\n\nIncorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2773)\n\nInteger overflow in the Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2774)\n\nMitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2775)\n\nSandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2776)\n\nPrivilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2777)\n\nSandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2778)\n\nIncorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2779)\n\nPrivilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2780)\n\nInteger overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2781)\n\nPrivilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2782)\n\nInformation disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2783)\n\nMitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2784)\n\nInvalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2785)\n\nUse-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2786)\n\nUse-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2787)\n\nIncorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2788)\n\nUse-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2789)\n\nSame-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2790)\n\nMitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2791)\n\nMemory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2792)\n\nMemory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.(CVE-2026-2793)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for firefox is now available for master/openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS/openEuler-24.03-LTS-Next/openEuler-24.03-LTS-SP1/openEuler-24.03-LTS-SP2/openEuler-24.03-LTS-SP3.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"firefox",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2026-1471",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
			},
			{
				"summary":"CVE-2026-2447",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2447&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2757",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2757&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2758",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2758&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2759",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2759&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2760",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2760&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2761",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2761&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2762",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2762&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2763",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2763&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2764",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2764&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2765",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2765&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2766",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2766&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2767",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2767&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2768",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2768&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2769",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2769&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2770",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2770&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2771",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2771&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2772",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2772&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2773",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2773&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2774",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2774&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2775",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2775&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2776",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2776&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2777",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2777&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2778",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2778&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2779",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2779&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2780",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2780&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2781",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2781&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2782",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2782&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2783",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2783&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2784",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2784&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2785",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2785&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2786",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2786&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2787",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2787&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2788",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2788&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2789",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2789&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2790",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2790&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2791",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2791&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2792",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2792&packageName=firefox"
			},
			{
				"summary":"CVE-2026-2793",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-2793&packageName=firefox"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2447"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2757"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2758"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2759"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2760"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2761"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2762"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2763"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2764"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2765"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2766"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2767"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2768"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2769"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2770"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2771"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2772"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2773"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2774"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2775"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2776"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2777"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2778"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2779"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2780"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2781"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2782"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2783"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2784"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2785"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2786"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2787"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2788"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2789"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2790"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2791"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2792"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2793"
			},
			{
				"summary":"openEuler-SA-2026-1471 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2026/csaf-openeuler-sa-2026-1471.json"
			}
		],
		"title":"An update for firefox is now available for openEuler-22.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2026-03-02T14:19:32+08:00",
			"revision_history":[
				{
					"date":"2026-03-02T14:19:32+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-03-02T14:19:32+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-03-02T14:19:32+08:00",
			"id":"openEuler-SA-2026-1471",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"openEuler-22.03-LTS-SP4",
									"name":"openEuler-22.03-LTS-SP4"
								},
								"name":"openEuler-22.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"firefox-140.8.0-1.oe2203sp4.aarch64.rpm",
									"name":"firefox-140.8.0-1.oe2203sp4.aarch64.rpm"
								},
								"name":"firefox-140.8.0-1.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64.rpm",
									"name":"firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64.rpm"
								},
								"name":"firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"firefox-debugsource-140.8.0-1.oe2203sp4.aarch64.rpm",
									"name":"firefox-debugsource-140.8.0-1.oe2203sp4.aarch64.rpm"
								},
								"name":"firefox-debugsource-140.8.0-1.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"firefox-140.8.0-1.oe2203sp4.src.rpm",
									"name":"firefox-140.8.0-1.oe2203sp4.src.rpm"
								},
								"name":"firefox-140.8.0-1.oe2203sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"firefox-140.8.0-1.oe2203sp4.x86_64.rpm",
									"name":"firefox-140.8.0-1.oe2203sp4.x86_64.rpm"
								},
								"name":"firefox-140.8.0-1.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64.rpm",
									"name":"firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64.rpm"
								},
								"name":"firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"firefox-debugsource-140.8.0-1.oe2203sp4.x86_64.rpm",
									"name":"firefox-debugsource-140.8.0-1.oe2203sp4.x86_64.rpm"
								},
								"name":"firefox-debugsource-140.8.0-1.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"firefox-140.8.0-1.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"name":"firefox-140.8.0-1.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"name":"firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"firefox-debugsource-140.8.0-1.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"name":"firefox-debugsource-140.8.0-1.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"firefox-140.8.0-1.oe2203sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"name":"firefox-140.8.0-1.oe2203sp4.src as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"firefox-140.8.0-1.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"name":"firefox-140.8.0-1.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"name":"firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"firefox-debugsource-140.8.0-1.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64",
					"name":"firefox-debugsource-140.8.0-1.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2026-2447",
			"notes":[
				{
					"text":"Heap buffer overflow vulnerability exists in libvpx component. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, and Firefox ESR < 115.32.1.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2447"
		},
		{
			"cve":"CVE-2026-2757",
			"notes":[
				{
					"text":"Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2757"
		},
		{
			"cve":"CVE-2026-2758",
			"notes":[
				{
					"text":"Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2758"
		},
		{
			"cve":"CVE-2026-2759",
			"notes":[
				{
					"text":"Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2759"
		},
		{
			"cve":"CVE-2026-2760",
			"notes":[
				{
					"text":"Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2760"
		},
		{
			"cve":"CVE-2026-2761",
			"notes":[
				{
					"text":"Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2761"
		},
		{
			"cve":"CVE-2026-2762",
			"notes":[
				{
					"text":"Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2762"
		},
		{
			"cve":"CVE-2026-2763",
			"notes":[
				{
					"text":"Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2763"
		},
		{
			"cve":"CVE-2026-2764",
			"notes":[
				{
					"text":"JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2764"
		},
		{
			"cve":"CVE-2026-2765",
			"notes":[
				{
					"text":"Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2765"
		},
		{
			"cve":"CVE-2026-2766",
			"notes":[
				{
					"text":"Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2766"
		},
		{
			"cve":"CVE-2026-2767",
			"notes":[
				{
					"text":"Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2767"
		},
		{
			"cve":"CVE-2026-2768",
			"notes":[
				{
					"text":"Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2768"
		},
		{
			"cve":"CVE-2026-2769",
			"notes":[
				{
					"text":"A use-after-free vulnerability exists in the Storage: IndexedDB component of Mozilla Firefox, Firefox ESR, and Thunderbird. This vulnerability occurs when the program continues to reference a memory area after it has been freed, which can lead to program crashes, the use of unexpected values, or the execution of arbitrary code. This vulnerability poses a threat to confidentiality, integrity, and availability.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2769"
		},
		{
			"cve":"CVE-2026-2770",
			"notes":[
				{
					"text":"Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2770"
		},
		{
			"cve":"CVE-2026-2771",
			"notes":[
				{
					"text":"Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2771"
		},
		{
			"cve":"CVE-2026-2772",
			"notes":[
				{
					"text":"Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2772"
		},
		{
			"cve":"CVE-2026-2773",
			"notes":[
				{
					"text":"Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2773"
		},
		{
			"cve":"CVE-2026-2774",
			"notes":[
				{
					"text":"Integer overflow in the Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2774"
		},
		{
			"cve":"CVE-2026-2775",
			"notes":[
				{
					"text":"Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2775"
		},
		{
			"cve":"CVE-2026-2776",
			"notes":[
				{
					"text":"Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2776"
		},
		{
			"cve":"CVE-2026-2777",
			"notes":[
				{
					"text":"Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2777"
		},
		{
			"cve":"CVE-2026-2778",
			"notes":[
				{
					"text":"Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2778"
		},
		{
			"cve":"CVE-2026-2779",
			"notes":[
				{
					"text":"Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2779"
		},
		{
			"cve":"CVE-2026-2780",
			"notes":[
				{
					"text":"Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2780"
		},
		{
			"cve":"CVE-2026-2781",
			"notes":[
				{
					"text":"Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2781"
		},
		{
			"cve":"CVE-2026-2782",
			"notes":[
				{
					"text":"Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2782"
		},
		{
			"cve":"CVE-2026-2783",
			"notes":[
				{
					"text":"Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2783"
		},
		{
			"cve":"CVE-2026-2784",
			"notes":[
				{
					"text":"Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2784"
		},
		{
			"cve":"CVE-2026-2785",
			"notes":[
				{
					"text":"Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2785"
		},
		{
			"cve":"CVE-2026-2786",
			"notes":[
				{
					"text":"Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2786"
		},
		{
			"cve":"CVE-2026-2787",
			"notes":[
				{
					"text":"Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2787"
		},
		{
			"cve":"CVE-2026-2788",
			"notes":[
				{
					"text":"Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2788"
		},
		{
			"cve":"CVE-2026-2789",
			"notes":[
				{
					"text":"Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.1,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2789"
		},
		{
			"cve":"CVE-2026-2790",
			"notes":[
				{
					"text":"Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.4,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2790"
		},
		{
			"cve":"CVE-2026-2791",
			"notes":[
				{
					"text":"Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"LOW",
						"baseScore":3.4,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Low",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2791"
		},
		{
			"cve":"CVE-2026-2792",
			"notes":[
				{
					"text":"Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2792"
		},
		{
			"cve":"CVE-2026-2793",
			"notes":[
				{
					"text":"Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1471"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:firefox-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debuginfo-140.8.0-1.oe2203sp4.x86_64",
						"openEuler-22.03-LTS-SP4:firefox-debugsource-140.8.0-1.oe2203sp4.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-2793"
		}
	]
}