CVE-2024-5696

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

27 Mar 2025, 19:55

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html - Mailing List, Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-26/ - () https://www.mozilla.org/security/advisories/mfsa2024-26/ - Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 - Issue Tracking, Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-25/ - () https://www.mozilla.org/security/advisories/mfsa2024-25/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2024-28/ - () https://www.mozilla.org/security/advisories/mfsa2024-28/ - Vendor Advisory
First Time Mozilla thunderbird
Debian debian Linux
Mozilla firefox
Debian
Mozilla
CPE cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*

19 Jun 2024, 10:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html -

13 Jun 2024, 23:15

Type Values Removed Values Added
Summary By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12. By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
References
  • () https://www.mozilla.org/security/advisories/mfsa2024-28/ -

13 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html -

11 Jun 2024, 13:54

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-11 13:15

Updated : 2025-03-27 19:55


NVD link : CVE-2024-5696

Mitre link : CVE-2024-5696


JSON object : View

Products Affected

debian

  • debian_linux

mozilla

  • firefox
  • thunderbird
CWE

No CWE.