Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-11697

Опубликовано: 26 нояб. 2024
Источник: debian
EPSS Низкий

Описание

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed133.0-1package
firefox-esrfixed128.5.0esr-1package
thunderbirdfixed1:128.5.0esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-63/#CVE-2024-11697

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-64/#CVE-2024-11697

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/#CVE-2024-11697

EPSS

Процентиль: 30%
0.00105
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
7 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 3.1
redhat
7 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 8.8
nvd
7 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 8.8
github
7 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 8.8
fstec
7 месяцев назад

Уязвимость окна подтверждения &quot;Открыть исполняемый файл&quot; браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 30%
0.00105
Низкий