CVE-2026-8973
Memory Corruption Vulnerabilities in Firefox
Publication date: 2026-05-19
Last updated on: 2026-05-20
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | to 151.0.0 (exc) |
| mozilla | thunderbird | to 151.0.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the memory safety bugs in Thunderbird 150, identified as CVE-2026-8973, affect compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability involves memory safety bugs found in Firefox version 150. Some of these bugs showed signs of memory corruption, which means that they could potentially be exploited by attackers to execute arbitrary code on the affected system. The issue was addressed and fixed in Firefox version 151.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker to run arbitrary code on your system through Firefox 150. This could lead to unauthorized actions such as installing malware, stealing data, or taking control of your device.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability in Firefox 150 was fixed in Firefox 151. To mitigate this vulnerability, you should update your Firefox browser to version 151 or later.