Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1758062 | Exploit Issue Tracking Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2022-09/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-12-22 20:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-26485
Mitre link : CVE-2022-26485
CVE.ORG link : CVE-2022-26485
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- firefox_focus
- firefox_esr
CWE
CWE-416
Use After Free