![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.833019 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (SUSE-SU-2024:0229-1) |
Summary: | The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2024:0229-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2024:0229-1 advisory. Vulnerability Insight: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 115.7.0 ESR (MFSA2024-02) (bsc#1218955): - CVE-2024-0741: Out of bounds write in ANGLE - CVE-2024-0742: Failure to update user input timestamp - CVE-2024-0746: Crash when listing printers on Linux - CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set - CVE-2024-0749: Phishing site popup could show local origin in address bar - CVE-2024-0750: Potential permissions request bypass via clickjacking - CVE-2024-0751: Privilege escalation through devtools - CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain - CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 Affected Software/OS: 'MozillaFirefox' package(s) on openSUSE Leap 15.5. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-0741 https://bugzilla.mozilla.org/show_bug.cgi?id=1864587 https://www.mozilla.org/security/advisories/mfsa2024-01/ https://www.mozilla.org/security/advisories/mfsa2024-02/ https://www.mozilla.org/security/advisories/mfsa2024-04/ https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html Common Vulnerability Exposure (CVE) ID: CVE-2024-0742 https://bugzilla.mozilla.org/show_bug.cgi?id=1867152 Common Vulnerability Exposure (CVE) ID: CVE-2024-0746 https://bugzilla.mozilla.org/show_bug.cgi?id=1660223 Common Vulnerability Exposure (CVE) ID: CVE-2024-0747 https://bugzilla.mozilla.org/show_bug.cgi?id=1764343 Common Vulnerability Exposure (CVE) ID: CVE-2024-0749 https://bugzilla.mozilla.org/show_bug.cgi?id=1813463 Common Vulnerability Exposure (CVE) ID: CVE-2024-0750 https://bugzilla.mozilla.org/show_bug.cgi?id=1863083 Common Vulnerability Exposure (CVE) ID: CVE-2024-0751 https://bugzilla.mozilla.org/show_bug.cgi?id=1865689 Common Vulnerability Exposure (CVE) ID: CVE-2024-0753 https://bugzilla.mozilla.org/show_bug.cgi?id=1870262 Common Vulnerability Exposure (CVE) ID: CVE-2024-0755 Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |