### [CVE-2016-9899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2045.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2050.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Use-after-free%20while%20manipulating%20DOM%20events%20and%20audio%20elements&color=brighgreen) ### Description Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6. ### POC #### Reference - https://bugzilla.mozilla.org/show_bug.cgi?id=1317409 - https://www.exploit-db.com/exploits/41042/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/hwiwonl/dayone