Files
CVEs-PoC/2017/CVE-2017-7756.md
T
2025-09-29 21:09:30 +02:00

20 lines
982 B
Markdown

### [CVE-2017-7756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Use-after-free%20and%20use-after-scope%20logging%20XHR%20header%20errors&color=brightgreen)
### Description
A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
### POC
#### Reference
- https://www.mozilla.org/security/advisories/mfsa2017-15/
#### Github
No PoCs found on GitHub currently.