Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  Debian DLA | DLA-3969-1 | thunderbird security update | 
|  Debian DLA | DLA-3971-1 | firefox-esr security update | 
|  Debian DSA | DSA-5820-1 | firefox-esr security update | 
|  Debian DSA | DSA-5821-1 | thunderbird security update | 
|  Ubuntu USN | USN-7134-1 | Firefox vulnerabilities | 
|  Ubuntu USN | USN-7193-1 | Thunderbird vulnerability | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Jun 2025 18:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Mozilla Mozilla firefox Mozilla thunderbird | |
| CPEs | cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* | |
| Vendors & Products | Mozilla Mozilla firefox Mozilla thunderbird | 
Fri, 13 Dec 2024 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18. | Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18. | 
Fri, 13 Dec 2024 14:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5. | Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Firefox ESR < 115.18. | 
| References |  | 
Mon, 09 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Els | |
| CPEs | cpe:/o:redhat:rhel_els:7 | |
| Vendors & Products | Redhat rhel Els | 
Wed, 04 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Tus | |
| CPEs | cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 | |
| Vendors & Products | Redhat rhel Tus | 
Tue, 03 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 | |
| Vendors & Products | Redhat rhel Tus | 
Tue, 03 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus | |
| CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 | |
| Vendors & Products | Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus | 
Mon, 02 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat Redhat enterprise Linux | |
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 | |
| Vendors & Products | Redhat Redhat enterprise Linux | 
Wed, 27 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 27 Nov 2024 01:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims | |
| Weaknesses | CWE-79 | |
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
Tue, 26 Nov 2024 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5. | |
| References |  | 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-12-13T16:22:57.059Z
Reserved: 2024-11-25T16:29:29.656Z
Link: CVE-2024-11694
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-11-27T16:37:52.077Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-11-26T14:15:18.943
Modified: 2025-06-24T17:01:25.223
Link: CVE-2024-11694
 Redhat
                        Redhat
                     OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.