Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49913 | By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131. |
Ubuntu USN |
USN-7056-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-7991-1 | Thunderbird vulnerabilities |
Tue, 18 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Fri, 11 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilla
Mozilla firefox Mozilla firefox Esr Mozilla thunderbird |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:129.0:beta2:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:129.0:beta3:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:129.0:beta4:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:129.0:beta5:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:129.0:beta6:*:*:*:*:*:* cpe:2.3:a:mozilla:thunderbird:129.0:beta:*:*:*:*:*:* |
|
| Vendors & Products |
Mozilla
Mozilla firefox Mozilla firefox Esr Mozilla thunderbird |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 10 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:8.8 |
Tue, 08 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Els
Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:rhel_els:7 |
|
| Vendors & Products |
Redhat rhel Els
Redhat rhel Tus |
Fri, 04 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus |
|
| CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:9.2 |
|
| Vendors & Products |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Eus |
Thu, 03 Oct 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Wed, 02 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-203 | |
| Metrics |
cvssV3_1
|
Wed, 02 Oct 2024 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | firefox: thunderbird: External protocol handlers could be enumerated via popups | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 01 Oct 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 01 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131. | |
| References |
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-03-18T19:36:14.028Z
Reserved: 2024-10-01T06:10:19.182Z
Link: CVE-2024-9398
Updated: 2024-10-01T18:48:10.851Z
Status : Modified
Published: 2024-10-01T16:15:10.913
Modified: 2025-03-18T20:15:25.150
Link: CVE-2024-9398
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN