{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata. Fed continuously.","feed_url":"https://feed.craftedsignal.io/cpes/cpe2.3amozillafirefox-/feed.json","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cpes":["cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*","cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*","cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*","cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*"],"_cs_cves":[{"cvss":7.3,"id":"CVE-2026-8090"},{"cvss":9.8,"id":"CVE-2026-8091"},{"cvss":8.1,"id":"CVE-2026-8092"},{"cvss":8.1,"id":"CVE-2026-8093"},{"cvss":9.8,"id":"CVE-2026-8094"}],"_cs_exploited":false,"_cs_has_poc":false,"_cs_poc_references":[],"_cs_products":["Firefox ESR","Firefox","Thunderbird ESR","Thunderbird"],"_cs_severities":["high"],"_cs_tags":["vulnerability","arbitrary code execution","mozilla"],"_cs_type":"advisory","_cs_vendors":["Mozilla"],"content_html":"\u003cp\u003eOn May 11, 2026, CERT-FR published an advisory regarding multiple vulnerabilities found in Mozilla products, specifically Firefox and Thunderbird. These vulnerabilities can be exploited by an attacker to achieve arbitrary code execution, as well as cause other unspecified security issues on a targeted system. The affected products include Firefox ESR versions prior to 115.35.2 and 140.10.2, Firefox versions prior to 150.0.2, Thunderbird ESR versions prior to 140.10.2, and Thunderbird versions prior to 140.10.2 and 150.0.2. It is recommended that users update to the latest versions to mitigate these risks. The vulnerabilities are tracked by CVE-2026-8090, CVE-2026-8091, CVE-2026-8092, CVE-2026-8093, and CVE-2026-8094.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker identifies a vulnerable Firefox or Thunderbird instance.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious web page or email containing the exploit.\u003c/li\u003e\n\u003cli\u003eThe user opens the malicious web page in Firefox or views the email in Thunderbird.\u003c/li\u003e\n\u003cli\u003eThe exploit triggers a vulnerability, such as a memory corruption issue.\u003c/li\u003e\n\u003cli\u003eThe attacker gains arbitrary code execution on the user\u0026rsquo;s machine.\u003c/li\u003e\n\u003cli\u003eThe attacker installs malware or performs other malicious actions.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of these vulnerabilities can lead to arbitrary code execution on the victim\u0026rsquo;s machine. This can allow an attacker to install malware, steal sensitive information, or perform other malicious activities. Given the widespread use of Firefox and Thunderbird, a large number of users could be affected if these vulnerabilities are not addressed.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade Firefox ESR to version 115.35.2 or later to remediate CVE-2026-8090, CVE-2026-8091, CVE-2026-8092, CVE-2026-8093, and CVE-2026-8094.\u003c/li\u003e\n\u003cli\u003eUpgrade Firefox to version 150.0.2 or later to remediate CVE-2026-8090, CVE-2026-8091, CVE-2026-8092, CVE-2026-8093, and CVE-2026-8094.\u003c/li\u003e\n\u003cli\u003eUpgrade Thunderbird ESR to version 140.10.2 or later to remediate CVE-2026-8090, CVE-2026-8091, CVE-2026-8092, CVE-2026-8093, and CVE-2026-8094.\u003c/li\u003e\n\u003cli\u003eUpgrade Thunderbird to version 150.0.2 or later to remediate CVE-2026-8090, CVE-2026-8091, CVE-2026-8092, CVE-2026-8093, and CVE-2026-8094.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-11T12:07:38Z","date_published":"2026-05-11T12:07:38Z","id":"https://feed.craftedsignal.io/briefs/2026-05-mozilla-vulns/","summary":"Multiple vulnerabilities in Mozilla Firefox and Thunderbird products can lead to arbitrary code execution and unspecified security issues if the products are not updated to the latest versions.","title":"Multiple Vulnerabilities in Mozilla Products Leading to Arbitrary Code Execution","url":"https://feed.craftedsignal.io/briefs/2026-05-mozilla-vulns/"}],"language":"en","title":"CraftedSignal Threat Feed — Cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*","version":"https://jsonfeed.org/version/1.1"}