CVE-2011-0065
Mozilla Firefox <3.5.19 & SeaMonkey <2.0.14 - Use After Free
Title source: llmDescription
Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteosx
https://www.exploit-db.com/exploits/18377
exploitdb
WORKING POC
VERIFIED
by mr_me · htmlremotewindows
https://www.exploit-db.com/exploits/17672
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/17650
metasploit
WORKING POC
NORMAL
by regenrecht, Rh0 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/mozilla_mchannel.rb
metasploit
WORKING POC
NORMAL
by regenrecht, Rh0 · rubypocosx
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/browser/mozilla_mchannel.rb
References (11)
Scores
EPSS
0.8326
EPSS Percentile
99.3%
Details
CWE
CWE-399
Status
published
Products (47)
mozilla/firefox
3.6
mozilla/firefox
3.6.2
mozilla/firefox
3.6.3
mozilla/firefox
3.6.4
mozilla/firefox
3.6.6
mozilla/firefox
3.6.7
mozilla/firefox
3.6.8
mozilla/firefox
3.6.9
mozilla/firefox
3.6.10
mozilla/firefox
3.6.11
... and 37 more
Published
May 07, 2011
Tracked Since
Feb 18, 2026