{"alias":[],"description":"Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.","epss":{"percentile":"0.9928","score":"0.832590"},"id":"CVE-2011-0065","metrics":{"cvss2":{"ac_insuf_info":0,"access_complexity":"LOW","access_vector":"NETWORK","authentication":"NONE","availability_impact":"COMPLETE","base_score":10.0,"base_severity":"HIGH","confidentiality_impact":"COMPLETE","exploitability_score":10.0,"impact_score":10.0,"integrity_impact":"COMPLETE","obtain_all_privilege":0,"obtain_other_privilege":0,"obtain_user_privilege":0,"user_interaction_required":0,"vector_string":"AV:N\/AC:L\/Au:N\/C:C\/I:C\/A:C","version":"2.0"}},"modified":"2026-04-29T01:13:23","nvd_status":"Modified","published":"2011-05-07T18:55:00","score":10.0,"severity":"HIGH","source":"cve@mitre.org","status":"PUBLISHED","weaknesses":[{"id":"CWE-399","name":"Resource Management Errors","type":"category"}]}