Impact
The vulnerability involves incorrect handling of boundary conditions in the JavaScript engine’s just‑in‑time (JIT) compiler. This flaw can cause an out‑of‑bounds memory operation while the engine is generating bytecode. The CVE description does not specify the exact consequences, but the nature of the defect suggests potential corruption of browser memory or instability.
Affected Systems
Mozilla Firefox is the only vendor identified. Versions prior to 150.0.3 are affected, as the fix is included in that release. No other products or versions are explicitly mentioned in the advisory.
Risk and Exploitability
The vulnerability is not listed in the CISA KEV catalog and no EPSS score is provided, meaning there is no publicly documented exploitation at this time. The CVSS score of 6.5 indicates a moderate severity threat. Potential exploitation would likely occur via malicious web content that triggers the vulnerable path in the JIT compiler. Based on the description, it is inferred that an attacker could induce memory corruption by delivering crafted JavaScript to a vulnerable browser instance.
OpenCVE Enrichment