Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-4vps-3cxv-xyd5
Vulnerability ID VCID-4vps-3cxv-xyd5
Aliases CVE-2024-5692
Summary On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as .url by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected.
Status Published
Exploitability None
Weighted Severity None
Risk None
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5692.json
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
epss 0.00413 https://api.first.org/data/v1/epss?cve=CVE-2024-5692
cvssv3.1 6.5 https://bugzilla.mozilla.org/show_bug.cgi?id=1891234
ssvc Track https://bugzilla.mozilla.org/show_bug.cgi?id=1891234
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-25
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-26
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2024-28
cvssv3.1 6.5 https://www.mozilla.org/security/advisories/mfsa2024-25/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-25/
cvssv3.1 6.5 https://www.mozilla.org/security/advisories/mfsa2024-26/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-26/
cvssv3.1 6.5 https://www.mozilla.org/security/advisories/mfsa2024-28/
ssvc Track https://www.mozilla.org/security/advisories/mfsa2024-28/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5692.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1891234
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/ Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1891234
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://www.mozilla.org/security/advisories/mfsa2024-25/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-25/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://www.mozilla.org/security/advisories/mfsa2024-26/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-26/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://www.mozilla.org/security/advisories/mfsa2024-28/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:09Z/ Found at https://www.mozilla.org/security/advisories/mfsa2024-28/
Exploit Prediction Scoring System (EPSS)
Percentile 0.54742
EPSS Score 0.00316
Published At April 16, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:16:25.786500+00:00 Mozilla Importer Import https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2024/mfsa2024-28.yml 38.0.0