Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-0753

Опубликовано: 23 янв. 2024
Источник: debian
EPSS Низкий

Описание

In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed122.0-1package
firefox-esrfixed115.7.0esr-1package
thunderbirdfixed1:115.7.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-01/#CVE-2024-0753

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-02/#CVE-2024-0753

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-04/#CVE-2024-0753

EPSS

Процентиль: 57%
0.00355
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVSS3: 6.1
redhat
больше 1 года назад

In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVSS3: 6.5
nvd
больше 1 года назад

In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVSS3: 6.5
github
больше 1 года назад

In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.

CVSS3: 4.2
fstec
больше 1 года назад

Уязвимость реализации механизма HSTS (HTTP Strict Transport Security) браузервов Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю обойти механизмы защиты

EPSS

Процентиль: 57%
0.00355
Низкий