### [CVE-2017-7749](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Use-after-free%20during%20docshell%20reloading&color=brightgreen) ### Description A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. ### POC #### Reference - https://www.mozilla.org/security/advisories/mfsa2017-15/ #### Github No PoCs found on GitHub currently.