CVE-2011-0065

Mozilla Firefox <3.5.19 & SeaMonkey <2.0.14 - Use After Free

Title source: llm

Description

Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteosx
https://www.exploit-db.com/exploits/18377
exploitdb WORKING POC VERIFIED
by mr_me · htmlremotewindows
https://www.exploit-db.com/exploits/17672
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/17650
exploitdb WORKING POC VERIFIED
by Rh0 · rubyremotewindows
https://www.exploit-db.com/exploits/17612
metasploit WORKING POC NORMAL
by regenrecht, Rh0 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/mozilla_mchannel.rb
metasploit WORKING POC NORMAL
by regenrecht, Rh0 · rubypocosx
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/browser/mozilla_mchannel.rb

Scores

EPSS 0.8326
EPSS Percentile 99.3%

Details

CWE
CWE-399
Status published
Products (47)
mozilla/firefox 3.6
mozilla/firefox 3.6.2
mozilla/firefox 3.6.3
mozilla/firefox 3.6.4
mozilla/firefox 3.6.6
mozilla/firefox 3.6.7
mozilla/firefox 3.6.8
mozilla/firefox 3.6.9
mozilla/firefox 3.6.10
mozilla/firefox 3.6.11
... and 37 more
Published May 07, 2011
Tracked Since Feb 18, 2026