Lucene search

K
attackerkbAttackerKBAKB:ABC8BA7E-9B71-4FD3-A5B8-11518355605F
HistoryJul 23, 2019 - 12:00 a.m.

CVE-2019-11707

2019-07-2300:00:00
attackerkb.com
21

0.752 High

EPSS

Percentile

98.2%

A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2.

Recent assessments:

gwillcox-r7 at November 22, 2020 2:44am UTC reported:

Reported as exploited in the wild as part of Google’s 2020 0day vulnerability spreadsheet they made available at <https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1869060786&gt;. Original tweet announcing this spreadsheet with the 2020 findings can be found at <https://twitter.com/maddiestone/status/1329837665378725888&gt;

Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0