{"id":"CVE-2022-26485","details":"Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox \u003c 97.0.2, Firefox ESR \u003c 91.6.1, Firefox for Android \u003c 97.3.0, Thunderbird \u003c 91.6.2, and Focus \u003c 97.3.0.","modified":"2026-04-16T04:36:13.812892951Z","published":"2022-12-22T20:15:22.563Z","related":["ALSA-2022:0818","ALSA-2022:0845","SUSE-SU-2022:0777-1","SUSE-SU-2022:0778-1","SUSE-SU-2022:0783-1","SUSE-SU-2022:0804-1","SUSE-SU-2022:14906-1","openSUSE-SU-2022:0783-1","openSUSE-SU-2022:0804-1","openSUSE-SU-2024:11909-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-26485"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-09/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1758062"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-26485.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"91.6.1"}]},{"events":[{"introduced":"0"},{"fixed":"97.0.2"}]},{"events":[{"introduced":"0"},{"fixed":"97.3.0"}]},{"events":[{"introduced":"0"},{"fixed":"97.3.0"}]},{"events":[{"introduced":"0"},{"fixed":"91.6.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}