By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.CreditsIrvan KurniawanReferenceshttps://bugzilla.mozilla.org/show_bug.cgi?id=1896555https://lists.debian.org/debian-lts-announce/2024/06/msg00000.htmlhttps://lists.debian.org/debian-lts-announce/2024/06/msg00010.htmlhttps://www.mozilla.org/security/advisories/mfsa2024-25/https://www.mozilla.org/security/advisories/mfsa2024-26/https://www.mozilla.org/security/advisories/mfsa2024-28/