发布时间: 2024年12月6日
修改时间: 2024年12月6日
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Network | |
CVSS评分 | N/A | 8.8 |
Attack Complexity | Low | |
Privileges Required | None | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | Required | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-5008 | firefox security update | 2025年3月6日 |
产品 | 包 | 状态 |
---|---|---|
V6 | firefox | Fixed |