An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.16.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "131.0.2"
}
]
},
{
"events": [
{
"introduced": "128.1.0"
},
{
"fixed": "128.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.16.0"
}
]
},
{
"events": [
{
"introduced": "128.0.1"
},
{
"fixed": "128.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "131.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-9680.json"