mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 17:50:34 +00:00
44 lines
2.2 KiB
Markdown
44 lines
2.2 KiB
Markdown
![]() |
### [CVE-2019-11707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707)
|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/De4dCr0w/Browser-pwn
|
||
|
- https://github.com/Enes4xd/Enes4xd
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/RUB-SysSec/JIT-Picker
|
||
|
- https://github.com/ZihanYe/web-browser-vulnerabilities
|
||
|
- https://github.com/alphaSeclab/sec-daily-2019
|
||
|
- https://github.com/cr0ss2018/cr0ss2018
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/ezelnur6327/Enes4xd
|
||
|
- https://github.com/ezelnur6327/ezelnur6327
|
||
|
- https://github.com/flabbergastedbd/cve-2019-11707
|
||
|
- https://github.com/googleprojectzero/fuzzilli
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/hwiwonl/dayone
|
||
|
- https://github.com/m1ghtym0/browser-pwn
|
||
|
- https://github.com/securesystemslab/PKRU-Safe
|
||
|
- https://github.com/securesystemslab/pkru-safe-cve-html
|
||
|
- https://github.com/tunnelshade/cve-2019-11707
|
||
|
- https://github.com/vigneshsrao/CVE-2019-11707
|
||
|
- https://github.com/zhangjiahui-buaa/MasterThesis
|
||
|
|