CVE-2024-5696

By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

06 Nov 2025, 22:25

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 - Issue Tracking, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 - Issue Tracking

Information

Published : 2024-06-11 13:15

Updated : 2025-11-06 22:25


NVD link : CVE-2024-5696

Mitre link : CVE-2024-5696

CVE.ORG link : CVE-2024-5696


JSON object : View

Products Affected

mozilla

  • thunderbird
  • firefox

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write