{"uuid": "58895891-8cca-4e6e-b419-93d63b677809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-26485", "type": "exploited", "source": "https://t.me/crackcodes/2484", "content": "CVE-2022-26485 exploit(UAF in XSLT parameter processing, bugzilla )\n\nRemoving an XSLT parameter during processing could have lead to an exploitable use-after-free. Mozilla have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox &lt; 97.0.2, Firefox ESR &lt; 91.6.1, Firefox for Android &lt; 97.3.0, Thunderbird &lt; 91.6.2, and Focus &lt; 97.3.0. \n\n\u26a0\ufe0fTested against Firefox 78.0 (Windows)\n\nDownload: https://system32.ink/news-feed/p/199/", "creation_timestamp": "2023-01-31T11:00:18.000000Z"}