Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-11697

Опубликовано: 26 нояб. 2024
Источник: debian
EPSS Низкий

Описание

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed133.0-1package
firefox-esrfixed128.5.0esr-1package
thunderbirdfixed1:128.5.0esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-63/#CVE-2024-11697

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-64/#CVE-2024-11697

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/#CVE-2024-11697

EPSS

Процентиль: 58%
0.00369
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
12 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 3.1
redhat
12 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 8.8
nvd
12 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 8.8
github
12 месяцев назад

When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 8.8
fstec
12 месяцев назад

Уязвимость окна подтверждения "Открыть исполняемый файл" браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 58%
0.00369
Низкий