- Description
- By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
- Source
- security@mozilla.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-203
- Hype score
- Not currently trending
#exploit #WebApp_Security CVE-2024-9398, CVE-2024-5690: Mozilla Firefox 0-day: URL protocol handler leak https://t.co/pIdud9XaiR
@akaclandestine
26 Nov 2024
364 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit #WebApp_Security CVE-2024-9398, CVE-2024-5690: Mozilla Firefox 0-day: URL protocol handler leak https://t.co/WqmRg2Fb8v
@ksg93rd
19 Nov 2024
89 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-23113 2 - CVE-2024-7965 3 - CVE-2024-47575 4 - CVE-2024-43451 5 - CVE-2024-5690 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
17 Nov 2024
185 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
👿Mozilla Firefoxの0-day解説記事公開👿 弊社エンジニアが発見・報告したCVE-2024-5690およびCVE-2024-9398の技術解説を公開しました。 最適化の実装差を悪用して、Webブラウザを"越えて"システム内部の情報を覗き見る手法をぜひご覧ください! https://t.co/xmrKgsCKmV https://t.co/8pMZkOPeo7
@RicercaSec_JP
16 Nov 2024
11970 Impressions
41 Retweets
139 Likes
44 Bookmarks
0 Replies
1 Quote
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4CF5E7C8-8673-4B56-AF92-44C08B086E02",
"versionEndExcluding": "127.0"
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9CFB2862-3A32-4691-AA4C-26EB28769E2C",
"versionEndExcluding": "115.12"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "96ED58CE-9E3C-4354-AB12-0F26C5906650",
"versionEndExcluding": "115.12"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
],
"operator": "OR"
}
]
}
]