<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4688 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4688/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 13:16:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4688/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4688)</title><link>https://feed.craftedsignal.io/briefs/2026-03-firefox-use-after-free/</link><pubDate>Tue, 24 Mar 2026 13:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-firefox-use-after-free/</guid><description>A use-after-free vulnerability in the Disability Access APIs component of Mozilla Firefox and Thunderbird (CVE-2026-4688) allows for sandbox escape, potentially leading to arbitrary code execution outside the sandbox.</description><content:encoded>&lt;p>CVE-2026-4688 is a critical use-after-free vulnerability residing within the Disability Access APIs component of Mozilla Firefox and Thunderbird. Discovered and reported by Mozilla, this flaw allows for a sandbox escape, meaning an attacker could potentially execute arbitrary code outside the security sandbox normally imposed by the browser or email client. This vulnerability affects Firefox versions prior to 149, Firefox ESR (Extended Support Release) versions prior to 140.9, Thunderbird…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>use-after-free</category><category>sandbox-escape</category><category>cve-2026-4688</category></item></channel></rss>