Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
No PoCs found on GitHub currently.