When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1842187 | Issue Tracking |
| https://www.mozilla.org/security/advisories/mfsa2024-63/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-64/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-67/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-68/ | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2024/11/msg00029.html |
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-11-26 14:15
Updated : 2025-11-03 22:16
NVD link : CVE-2024-11697
Mitre link : CVE-2024-11697
CVE.ORG link : CVE-2024-11697
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
