{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-4723/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["use-after-free","firefox","thunderbird","javascript","cve-2026-4723"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCVE-2026-4723 is a critical use-after-free vulnerability affecting the JavaScript Engine component in Mozilla Firefox and Thunderbird. This flaw exists in versions prior to 149. A remote attacker could potentially exploit this vulnerability by crafting malicious JavaScript code that, when processed by a vulnerable browser or email client, triggers the use-after-free condition. The vulnerability was reported by Mozilla Corporation and assigned a CVSS v3.1 base score of 9.8, indicating a high…\u003c/p\u003e\n","date_modified":"2026-03-24T13:16:08Z","date_published":"2026-03-24T13:16:08Z","id":"/briefs/2026-03-firefox-thunderbird-uaf/","summary":"A use-after-free vulnerability, CVE-2026-4723, in the JavaScript Engine of Mozilla Firefox and Thunderbird before version 149 could allow arbitrary code execution if successfully exploited by an attacker.","title":"Mozilla Firefox and Thunderbird Use-After-Free Vulnerability (CVE-2026-4723)","url":"https://feed.craftedsignal.io/briefs/2026-03-firefox-thunderbird-uaf/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-4723","version":"https://jsonfeed.org/version/1.1"}