### [CVE-2024-9396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9396) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%20128.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%20131%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Potential%20memory%20corruption%20may%20occur%20when%20cloning%20certain%20objects&color=brighgreen) ### Description It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131. ### POC #### Reference No PoCs from references. #### Github - https://github.com/5211-yx/javascript_fuzzer - https://github.com/googleprojectzero/fuzzilli