The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1530958
- https://github.com/5211-yx/javascript_fuzzer
- https://github.com/RUB-SysSec/JIT-Picker
- https://github.com/Sp0pielar/CVE-2019-9791
- https://github.com/TimerIzaya/fuzzilli-plus
- https://github.com/TimerIzaya/izayailli
- https://github.com/ZihanYe/web-browser-vulnerabilities
- https://github.com/addicjanov/js-vuln-db
- https://github.com/googleprojectzero/fuzzilli
- https://github.com/n0-traces/cve_monitor
- https://github.com/otravidaahora2t/js-vuln-db
- https://github.com/prosyslab/turbotv-fuzzilli
- https://github.com/tunz/js-vuln-db
- https://github.com/ulexec/Exploits
- https://github.com/zhangjiahui-buaa/MasterThesis