CVE-2024-11694

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-11694
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-11694.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-11694
Downstream
Related
Published
2024-11-26T14:15:18Z
Modified
2025-08-09T19:01:29Z
Summary
[none]
Details

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP frame-src bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.

References

Affected packages