Mozilla has released Firefox 97.0.2, Firefox ESR 91.6.1, Firefox for Android 97.3.0, and Focus 97.3.0 to address a couple of critical zero-day vulnerabilities, tracked as CVE-2022-26485 and CVE-2022-26485, actively exploited in attacks.
The two vulnerabilities are “Use-after-free” issues in XSLT parameter processing and in the WebGPU IPC Framework respectively.
Successful exploitation of the flaws can cause a program crash or execute arbitrary commands on the machine.
Below is the description of both flaws included in the advisory published by Mozilla:
“We have had reports of attacks in the wild abusing this flaw.” reads the advisory for both issues.
Mozilla hasn’t shared details about the attacks.
These vulnerabilities were reported by security researchers from the Chinese cybersecurity firm Qihoo 360 ATA.
Users are commended to install security updates immediately.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Mozilla)
[adrotate banner=”5″]
[adrotate banner=”13″]
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Office and Microsoft Windows flaws to…
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft…
ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS…
Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and…
Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the…
China-linked group UNC3886 targeted Singapore ’s telecom sector in a cyber espionage campaign, Singapore’s Cyber…
This website uses cookies.