{"id":136513,"date":"2022-03-06T23:02:39","date_gmt":"2022-03-07T07:02:39","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/03\/2-new-mozilla-firefox-0-day-bugs-under-active-attack-patch-your-browser-asap"},"modified":"2022-03-06T23:02:39","modified_gmt":"2022-03-07T07:02:39","slug":"2-new-mozilla-firefox-0-day-bugs-under-active-attack-patch-your-browser-asap","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/03\/2-new-mozilla-firefox-0-day-bugs-under-active-attack-patch-your-browser-asap","title":{"rendered":"2 New Mozilla Firefox 0-Day Bugs Under Active Attack \u2014 Patch Your Browser ASAP!"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/2-new-mozilla-firefox-0-day-bugs-under-active-attack-patch-your-browser-asap2.jpg\"><\/a><\/p>\n<p>Mozilla has pushed out-of-band <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-09\/\" rel=\"noopener\" target=\"_blank\">software updates<\/a> to its Firefox web browser to contain two high-impact security vulnerabilities, both of which it says are being actively exploited in the wild.<\/p>\n<p>Tracked as CVE-2022\u201326485 and CVE-2022\u201326486, the zero-day flaws have been described as <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/416.html\" rel=\"noopener\" target=\"_blank\">use-after-free issues<\/a> impacting the Extensible Stylesheet Language Transformations (<a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/XSLT\" rel=\"noopener\" target=\"_blank\">XSLT<\/a>) parameter processing and the <a href=\"https:\/\/thehackernews.com\/2022\/01\/your-graphics-card-fingerprint-can-be.html\" rel=\"noopener\" target=\"_blank\">WebGPU<\/a> inter-process communication (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Inter-process_communication\" rel=\"noopener\" target=\"_blank\">IPC<\/a>) Framework.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mozilla has pushed out-of-band software updates to its Firefox web browser to contain two high-impact security vulnerabilities, both of which it says are being actively exploited in the wild. Tracked as CVE-2022\u201326485 and CVE-2022\u201326486, the zero-day flaws have been described as use-after-free issues impacting the Extensible Stylesheet Language Transformations (XSLT) parameter processing and the WebGPU [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-136513","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=136513"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136513\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=136513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=136513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=136513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}