![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2022.0253 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2022-0253) |
Zusammenfassung: | The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2022-0253 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'thunderbird, thunderbird-l10n' package(s) announced via the MGASA-2022-0253 advisory. Vulnerability Insight: A popup window could be resized in a way to overlay the address bar with web content. (CVE-2022-34479) Use-after-free in nsSHistory. (CVE-2022-34470) CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI. (CVE-2022-34468) An email with a mismatching OpenPGP signature date was accepted as valid. (CVE-2022-2226) Potential integer overflow in ReplaceElementsAt. (CVE-2022-34481) CSP bypass enabling stylesheet injection. (CVE-2022-31744) Unavailable PAC file resulted in OCSP requests being blocked. (CVE-2022-34472) Undesired attributes could be set as part of prototype pollution. (CVE-2022-2200) Memory safety bugs fixed in Thunderbird 91.11 and Thunderbird 102. (CVE-2022-34484) Affected Software/OS: 'thunderbird, thunderbird-l10n' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-2200 https://bugzilla.mozilla.org/show_bug.cgi?id=1771381 https://www.mozilla.org/security/advisories/mfsa2022-24/ https://www.mozilla.org/security/advisories/mfsa2022-25/ https://www.mozilla.org/security/advisories/mfsa2022-26/ Common Vulnerability Exposure (CVE) ID: CVE-2022-2226 https://bugzilla.mozilla.org/show_bug.cgi?id=1775441 Common Vulnerability Exposure (CVE) ID: CVE-2022-31744 https://bugzilla.mozilla.org/show_bug.cgi?id=1757604 https://www.mozilla.org/security/advisories/mfsa2022-20/ Common Vulnerability Exposure (CVE) ID: CVE-2022-34468 https://bugzilla.mozilla.org/show_bug.cgi?id=1768537 Common Vulnerability Exposure (CVE) ID: CVE-2022-34470 https://bugzilla.mozilla.org/show_bug.cgi?id=1765951 Common Vulnerability Exposure (CVE) ID: CVE-2022-34472 https://bugzilla.mozilla.org/show_bug.cgi?id=1770123 Common Vulnerability Exposure (CVE) ID: CVE-2022-34479 https://bugzilla.mozilla.org/show_bug.cgi?id=1745595 Common Vulnerability Exposure (CVE) ID: CVE-2022-34481 https://bugzilla.mozilla.org/show_bug.cgi?id=1497246 Common Vulnerability Exposure (CVE) ID: CVE-2022-34484 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |