{"id":34261,"date":"2020-04-06T20:23:53","date_gmt":"2020-04-06T20:23:53","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/"},"modified":"2020-04-06T20:23:53","modified_gmt":"2020-04-06T20:23:53","slug":"mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/","title":{"rendered":"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims&#8217; computers"},"content":{"rendered":"<p>Mozilla has released security updates for its Firefox browser in conjunction with a US Cybersecurity and Infrastructure Security Agency (CISA) advisory warning that critical vulnerabilities in the browser are being actively exploited.<\/p>\n<p>&#8220;An attacker could exploit these vulnerabilities to take control of an affected system,&#8221; US CISA <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2020\/04\/03\/mozilla-patches-critical-vulnerabilities-firefox-firefox-esr\">said<\/a>, without providing any specific details about the two bugs. &#8220;These vulnerabilities have been detected in exploits in the wild.&#8221;<\/p>\n<p>To address these flaws, Firefox was updated to version 74.0.1 and Firefox Extended Support Release (ESR) \u2013 a slower evolving version for enterprises \u2013 was updated to 68.6.1. Firefox users should automatically receive these updates unless this capability has been disabled. Users can also check their version of Firefox via the Firefox -&gt; About Firefox menu and manually initiate an update if one is available.<\/p>\n<p>The bugs were reported by security researchers <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/revskills\">Francisco Alonso<\/a> and <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/javutin\">Javier Marcos<\/a>, the latter affiliated JMPSec. Reached via Twitter, Marcos declined to comment further.<\/p>\n<p>&#8220;We had a report that these exploits were being used on a malicious site in targeted attacks,&#8221; Mozilla spokesperson said in an email to <em>The Register<\/em>. &#8220;We have remedied the situation. We shipped a Firefox update out of cycle in an abundance of caution.&#8221;<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/01\/08\/shutterstock_1078800929.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Twitter logo and fingerprints\"><\/p>\n<h2 title=\"HTTP header ends in own goal\">If you use Twitter with Firefox in a shared computer account, you may have slightly spilled some private data on that PC<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/04\/02\/twitter_firefox_data_bug\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Mozilla&#8217;s Security Advisory identifies two CVEs: <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-11\/#CVE-2020-6819\">CVE-2020-6819<\/a>: Use-after-free() while running the nsDocShell destructor and <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2020-11\/#CVE-2020-6820\">CVE-2020-6820<\/a>: Use-after-free() when handling a ReadableStream.<\/p>\n<p>The bugs involve race conditions that can lead to use-after-free() errors.<\/p>\n<p>A race condition in the context of software describes an error arising from events happening in an unintended or undesirable sequence. For example, if two threads access the same variables or objects at the same time, one could change a value before the other is supposed to read that value, leading to execution taking the wrong turn.<\/p>\n<p>And a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/owasp.org\/www-community\/vulnerabilities\/Using_freed_memory\">use-after-free() error<\/a> involves accessing a block of allocated memory after it has been freed. Because these bugs are considered critical, it&#8217;s likely they could be exploited by malicious websites to run arbitrary code, such as malware or spyware, on the computers of visitors using vulnerable versions of Firefox.<\/p>\n<p>Mozilla declined to provide more details about the bugs. Details are not available to the public via the Firefox bug tracking system, which suggests they&#8217;re serious enough that those involved wish to keep the specific secret while the updates get distributed.<\/p>\n<p>Firefox recently slipped to third place in the browser popularity race, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/04\/06\/edge_number_two\/\" rel=\"noopener noreferrer\">displaced by Microsoft Edge<\/a>, which was replatformed last year onto the open source Chromium project.<\/p>\n<p>In January, Mozilla <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.theregister.co.uk\/2020\/01\/16\/mozilla_job_cuts\/\">laid off 70 people<\/a>, including its quality assurance leads. \u00ae<\/p>\n<p><em><strong>PS:<\/strong> Google fixed <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/chromereleases.googleblog.com\/2020\/03\/stable-channel-update-for-desktop_31.html\">three<\/a> high-severity security holes in Chrome at the end of last month, though these were not under active attack at the time, as far as we can tell.<\/em><\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1916\/-8373\/practical-tips-for-office-365-tenant-to-tenant-migration?td=wptl1916\">Practical tips for Office 365 tenant-to-tenant migration<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/04\/06\/mozilla_firefox_security_patches\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update now before it&#8217;s too late Mozilla has released security updates for its Firefox browser in conjunction with a US Cybersecurity and Infrastructure Security Agency (CISA) advisory warning that critical vulnerabilities in the browser are being actively exploited.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34262,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34261","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims&#039; computers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims&#039; computers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-06T20:23:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims&#8217; computers\",\"datePublished\":\"2020-04-06T20:23:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/\"},\"wordCount\":499,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/\",\"name\":\"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims' computers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg\",\"datePublished\":\"2020-04-06T20:23:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims&#8217; computers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims' computers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/","og_locale":"en_US","og_type":"article","og_title":"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims' computers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-06T20:23:53+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims&#8217; computers","datePublished":"2020-04-06T20:23:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/"},"wordCount":499,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/","url":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/","name":"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims' computers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg","datePublished":"2020-04-06T20:23:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mozilla-plugs-two-firefox-browser-holes-exploited-in-the-wild-by-hackers-to-hijack-victims-computers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Mozilla plugs two Firefox browser holes exploited in the wild by hackers to hijack victims&#8217; computers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34261"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34261\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34262"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}