mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-05 18:27:17 +00:00
2.0 KiB
2.0 KiB
CVE-2019-17026
Description
Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.
POC
Reference
- http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1607443
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Enes4xd/Enes4xd
- https://github.com/HackOvert/awesome-bugs
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/cloudrise/lansweeper-reports
- https://github.com/cr0ss2018/cr0ss2018
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/ezelnur6327/Enes4xd
- https://github.com/ezelnur6327/ezelnur6327
- https://github.com/forrest-orr/DoubleStar
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/lsw29475/CVE-2019-17026
- https://github.com/maxpl0it/CVE-2019-17026-Exploit
- https://github.com/mgaudet/SpiderMonkeyBibliography
- https://github.com/v3nt4n1t0/DetectMozillaFirefoxVulnDomain.ps1