Search for vulnerabilities
| Vulnerability ID | VCID-2a5d-8cac-mkft |
| Aliases |
CVE-2023-29542
|
| Summary | A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code.*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.* |
| Status | Published |
| Exploitability | None |
| Weighted Severity | None |
| Risk | None |
| Affected and Fixed Packages | Package Details |
| Reference id | Reference type | URL |
|---|---|---|
| https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29542.json | ||
| https://api.first.org/data/v1/epss?cve=CVE-2023-29542 | ||
| 2186107 | https://bugzilla.redhat.com/show_bug.cgi?id=2186107 | |
| mfsa2023-13 | https://www.mozilla.org/en-US/security/advisories/mfsa2023-13 | |
| mfsa2023-13 | https://www.mozilla.org/security/advisories/mfsa2023-13/ | |
| mfsa2023-14 | https://www.mozilla.org/en-US/security/advisories/mfsa2023-14 | |
| mfsa2023-14 | https://www.mozilla.org/security/advisories/mfsa2023-14/ | |
| mfsa2023-15 | https://www.mozilla.org/en-US/security/advisories/mfsa2023-15 | |
| mfsa2023-15 | https://www.mozilla.org/security/advisories/mfsa2023-15/ | |
| show_bug.cgi?id=1810793 | https://bugzilla.mozilla.org/show_bug.cgi?id=1810793 | |
| show_bug.cgi?id=1815062 | https://bugzilla.mozilla.org/show_bug.cgi?id=1815062 |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.29026 |
| EPSS Score | 0.00107 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T13:16:58.075634+00:00 | Mozilla Importer | Import | https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2023/mfsa2023-13.yml | 38.0.0 |