{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0742","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2024-01-19T16:52:24.593Z","datePublished":"2024-01-23T13:48:15.625Z","dateUpdated":"2025-05-30T14:19:26.249Z"},"containers":{"cna":{"affected":[{"product":"Firefox","vendor":"Mozilla","versions":[{"lessThan":"122","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"Firefox ESR","vendor":"Mozilla","versions":[{"lessThan":"115.7","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"Thunderbird","vendor":"Mozilla","versions":[{"lessThan":"115.7","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7.","supportingMedia":[{"type":"text/html","base64":false,"value":"It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7."}]}],"problemTypes":[{"descriptions":[{"description":"Failure to update user input timestamp","lang":"en","type":"text"}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1867152"},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"}],"credits":[{"lang":"en","value":"Andrew McCreight"}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2024-01-31T16:06:27.323Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:18:17.931Z"},"title":"CVE Program Container","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1867152","tags":["x_transferred"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","tags":["x_transferred"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","tags":["x_transferred"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-noinfo Not enough information"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","integrityImpact":"LOW","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T17:35:26.769881Z","id":"CVE-2024-0742","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-30T14:19:26.249Z"}}]}}