Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-5696

Опубликовано: 11 июн. 2024
Источник: debian
EPSS Низкий

Описание

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed127.0-1package
firefox-esrfixed115.12.0esr-1package
thunderbirdfixed1:115.12.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-25/#CVE-2024-5696

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-26/#CVE-2024-5696

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-28/#CVE-2024-5696

EPSS

Процентиль: 81%
0.01645
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

CVSS3: 6.1
redhat
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

CVSS3: 8.6
nvd
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

CVSS3: 8.6
github
около 1 года назад

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 81%
0.01645
Низкий