Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-3ep8-9hjn-dfhq
Vulnerability ID VCID-3ep8-9hjn-dfhq
Aliases CVE-2009-2477
Summary Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may allow execution of arbitrary code or local privilege escalation.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added July 12, 2009
Description Mozilla Firefox 3.5 - Font tags Remote Buffer Overflow
Ransomware campaign use Known
Source publication date July 13, 2009
Exploit type remote
Platform windows
Data source Metasploit
Description This module exploits a memory corruption vulnerability in the Mozilla Firefox browser. This flaw occurs when a bug in the javascript interpreter fails to preserve the return value of the escape() function and results in uninitialized memory being used instead. This module has only been tested on Windows, but should work on other platforms as well with the current targets.
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date July 13, 2009
Platform OSX,Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/firefox_escape_retval.rb
Exploit Prediction Scoring System (EPSS)
Percentile 0.99263
EPSS Score 0.83306
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:06:07.529628+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201301-01 38.0.0