By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 | Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html | Mailing List Third Party Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-25/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-26/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-28/ | Vendor Advisory |
| https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 | Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html | Mailing List Third Party Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-25/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-26/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2024-28/ | Vendor Advisory |
Configurations
History
06 Nov 2025, 22:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 - Issue Tracking |
27 Mar 2025, 19:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 - Issue Tracking, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html - Mailing List, Third Party Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-25/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-26/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-28/ - Vendor Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* |
|
| First Time |
Debian
Mozilla firefox Mozilla Mozilla thunderbird Debian debian Linux |
21 Nov 2024, 09:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1896555 - | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html - | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html - | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-25/ - | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-26/ - | |
| References | () https://www.mozilla.org/security/advisories/mfsa2024-28/ - |
01 Aug 2024, 13:59
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
| CWE | CWE-787 |
19 Jun 2024, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
13 Jun 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. |
13 Jun 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
11 Jun 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-11 13:15
Updated : 2025-11-06 22:25
NVD link : CVE-2024-5696
Mitre link : CVE-2024-5696
CVE.ORG link : CVE-2024-5696
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write
