{"id":"CVE-2019-9790","details":"A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 60.6, Firefox ESR \u003c 60.6, and Firefox \u003c 66.","modified":"2026-03-12T23:33:45.434748Z","published":"2019-04-26T17:29:01.383Z","related":["MGASA-2019-0116","MGASA-2019-0129","SUSE-SU-2019:0852-1","SUSE-SU-2019:0853-1","SUSE-SU-2019:0871-1","openSUSE-SU-2019:1077-1","openSUSE-SU-2019:1126-1","openSUSE-SU-2019:1162-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-11/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0966"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1144"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-07/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-08/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1525145"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-9790.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"60.6"}]},{"events":[{"introduced":"0"},{"last_affected":"66.0"}]},{"events":[{"introduced":"0"},{"last_affected":"60.6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}