Search for vulnerabilities
Vulnerability details: VCID-puzw-t6gq-9ubx
Vulnerability ID VCID-puzw-t6gq-9ubx
Aliases CVE-2019-11707
Summary A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11707.json
epss 0.81363 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.82688 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.82688 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.82688 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.82688 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.82688 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.82688 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
epss 0.82688 https://api.first.org/data/v1/epss?cve=CVE-2019-11707
cvssv3.1 8.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
ssvc Attend https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
cvssv3 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
archlinux Critical https://security.archlinux.org/AVG-994
archlinux Critical https://security.archlinux.org/AVG-995
cvssv3.1 8.8 https://security.gentoo.org/glsa/201908-12
ssvc Attend https://security.gentoo.org/glsa/201908-12
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2019-18
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2019-20
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2019-18/
ssvc Attend https://www.mozilla.org/security/advisories/mfsa2019-18/
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2019-20/
ssvc Attend https://www.mozilla.org/security/advisories/mfsa2019-20/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11707.json
https://api.first.org/data/v1/epss?cve=CVE-2019-11707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1721789 https://bugzilla.redhat.com/show_bug.cgi?id=1721789
201908-12 https://security.gentoo.org/glsa/201908-12
ASA-201906-18 https://security.archlinux.org/ASA-201906-18
ASA-201906-19 https://security.archlinux.org/ASA-201906-19
AVG-994 https://security.archlinux.org/AVG-994
AVG-995 https://security.archlinux.org/AVG-995
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
CVE-2019-11707 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1820
CVE-2019-11707 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47038.txt
CVE-2019-11707 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/50691.txt
CVE-2019-11707 https://nvd.nist.gov/vuln/detail/CVE-2019-11707
mfsa2019-18 https://www.mozilla.org/en-US/security/advisories/mfsa2019-18
mfsa2019-18 https://www.mozilla.org/security/advisories/mfsa2019-18/
mfsa2019-20 https://www.mozilla.org/en-US/security/advisories/mfsa2019-20
mfsa2019-20 https://www.mozilla.org/security/advisories/mfsa2019-20/
RHSA-2019:1603 https://access.redhat.com/errata/RHSA-2019:1603
RHSA-2019:1604 https://access.redhat.com/errata/RHSA-2019:1604
RHSA-2019:1623 https://access.redhat.com/errata/RHSA-2019:1623
RHSA-2019:1624 https://access.redhat.com/errata/RHSA-2019:1624
RHSA-2019:1626 https://access.redhat.com/errata/RHSA-2019:1626
RHSA-2019:1696 https://access.redhat.com/errata/RHSA-2019:1696
show_bug.cgi?id=1544386 https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
USN-4020-1 https://usn.ubuntu.com/4020-1/
USN-4045-1 https://usn.ubuntu.com/4045-1/
Data source KEV
Date added May 23, 2022
Description Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash.
Required action Apply updates per vendor instructions.
Due date June 13, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Ransomware campaign use Unknown
Data source Exploit-DB
Date added Feb. 2, 2022
Description Mozilla Firefox 67 - Array.pop JIT Type Confusion
Ransomware campaign use Unknown
Source publication date Feb. 2, 2022
Exploit type local
Platform windows
Source update date Feb. 2, 2022
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11707.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1544386
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-11707
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://security.gentoo.org/glsa/201908-12
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://security.gentoo.org/glsa/201908-12
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2019-18/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://www.mozilla.org/security/advisories/mfsa2019-18/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2019-20/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:49:50Z/ Found at https://www.mozilla.org/security/advisories/mfsa2019-20/
Exploit Prediction Scoring System (EPSS)
Percentile 0.99127
EPSS Score 0.81363
Published At Aug. 16, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:09:59.817195+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2019/mfsa2019-20.yml 37.0.0