Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Firefox 140 Released With Fix for Code Execution Vulnerability

Posted on June 26, 2025June 26, 2025 By CWS

Mozilla has launched Firefox 140, addressing a number of essential safety vulnerabilities, together with a high-impact use-after-free vulnerability that might result in code execution. 

The replace patches twelve distinct safety flaws starting from reminiscence questions of safety to platform-specific vulnerabilities affecting each desktop and cellular variations of the browser.

Summary1. Firefox 140 addresses CVE-2025-6424, a excessive severity use-after-free bug in FontFaceSet may allow code execution assaults.2. Addressed a number of reminiscence corruption bugs (CVE-2025-6436) that might result in arbitrary code execution.3. macOS and Android-specific vulnerabilities together with file warning bypass and URL manipulation patched.4. 12 complete safety flaws fastened – speedy replace important for cover.

Excessive-Affect Safety Flaws Addressed

CVE-2025-6424: Use-after-free in FontFaceSet

CVE-2025-6424 is a high-impact use-after-free vulnerability found in Firefox’s FontFaceSet element by safety researchers LJP and HexRabbit from the DEVCORE Analysis Crew. 

A use-after-free vulnerability happens when a program continues to make use of reminiscence after it has been freed or deallocated, resulting in reminiscence corruption.

On this particular case, the vulnerability exists in FontFaceSet, which is a part of Firefox’s font dealing with system that manages internet fonts and font loading operations. 

When triggered, this flaw ends in a probably exploitable crash that attackers may leverage to execute arbitrary code on the sufferer’s system. 

CVE-2025-6436: Reminiscence Security Bugs Assortment

CVE-2025-6436 encompasses a number of reminiscence security vulnerabilities that have been current in Firefox 139 and Thunderbird 139. 

This CVE was reported by Mozilla’s inner safety group, together with Andrew McCreight, Gabriele Svelto, Beth Rennie, and the Mozilla Fuzzing Crew, indicating it was found by means of Mozilla’s ongoing safety testing processes.

In contrast to a single particular vulnerability, CVE-2025-6436 represents a set of reminiscence questions of safety that confirmed proof of reminiscence corruption. 

Reminiscence security bugs can embody buffer overflows, use-after-free situations, double-free errors, and different reminiscence administration flaws.

Extra Safety Flaws

The replace additionally resolves CVE-2025-6425, a moderate-impact vulnerability the place the WebCompat WebExtension uncovered a persistent UUID that could possibly be used to trace customers throughout containers and shopping modes. 

Safety researcher Rob Wu recognized a privateness concern that might enable attackers to fingerprint browsers persistently.

CVE-2025-6426, a low-impact flaw, impacts Firefox for macOS, the place executable information with the terminal extension would open with out correct warning dialogs, probably exposing customers to malicious software program execution. This vulnerability was reported by safety researcher pwn2car.

Android customers profit from fixes for 2 distinct points. CVE-2025-6428 addressed a URL manipulation vulnerability the place Firefox for Android would incorrectly comply with URLs laid out in hyperlink querystring parameters as a substitute of the meant vacation spot, probably facilitating phishing assaults. 

Moreover, CVE-2025-6431 resolved a bypass mechanism for the exterior software immediate, which may expose customers to safety vulnerabilities in third-party functions.

The discharge contains fixes for a number of Content material Safety Coverage (CSP) bypass vulnerabilities. 

CVE-2025-6427 addressed a connect-src directive bypass by means of subdocument manipulation, whereas CVE-2025-6430 resolved points with Content material-Disposition header dealing with in embed and object tags that might result in cross-site scripting assaults.

Customers ought to instantly replace to Firefox 140 to guard in opposition to these vulnerabilities. 

The excellent nature of those fixes, notably the high-impact reminiscence questions of safety, makes this replace essential for sustaining browser safety. 

System directors ought to prioritize deploying this replace throughout organizational networks to stop potential exploitation of the documented vulnerabilities.

Examine dwell malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Code, Execution, Firefox, Fix, Released, Vulnerability

Post navigation

Previous Post: Realtek Vulnerability Let Attackers Trigger DoS Attack via Bluetooth Secure Connections Pairing Process
Next Post: WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews

Related Posts

Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News
New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News
CISA Warns of Rails Ruby on Rails Path Traversal Vulnerability Exploited in Attacks Cyber Security News
Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News
Armenian Hacker Extradited to U.S. After Ransomware Attacks on Tech Firms Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
  • Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
  • FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
  • Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
  • Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
  • Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
  • FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
  • Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
  • Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News