![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.856391 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (SUSE-SU-2024:3003-1) |
Summary: | The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2024:3003-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'MozillaFirefox' package(s) announced via the SUSE-SU-2024:3003-1 advisory. Vulnerability Insight: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 128.1.0 ESR (MFSA 2024-35, bsc#1228648) - CVE-2024-7518: Fullscreen notification dialog can be obscured by document - CVE-2024-7519: Out of bounds memory access in graphics shared memory handling - CVE-2024-7520: Type confusion in WebAssembly - CVE-2024-7521: Incomplete WebAssembly exception handing - CVE-2024-7522: Out of bounds read in editor component - CVE-2024-7524: CSP strict-dynamic bypass using web-compatibility shims - CVE-2024-7525: Missing permission check when creating a StreamFilter - CVE-2024-7526: Uninitialized memory used by WebGL - CVE-2024-7527: Use-after-free in JavaScript garbage collection - CVE-2024-7528: Use-after-free in IndexedDB - CVE-2024-7529: Document content could partially obscure security prompts - CVE-2024-7531: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Affected Software/OS: 'MozillaFirefox' package(s) on openSUSE Leap 15.5, openSUSE Leap 15.6. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-6600 Common Vulnerability Exposure (CVE) ID: CVE-2024-6601 Common Vulnerability Exposure (CVE) ID: CVE-2024-6602 Common Vulnerability Exposure (CVE) ID: CVE-2024-6603 Common Vulnerability Exposure (CVE) ID: CVE-2024-6604 Common Vulnerability Exposure (CVE) ID: CVE-2024-6605 Common Vulnerability Exposure (CVE) ID: CVE-2024-6606 Common Vulnerability Exposure (CVE) ID: CVE-2024-6607 Common Vulnerability Exposure (CVE) ID: CVE-2024-6608 Common Vulnerability Exposure (CVE) ID: CVE-2024-6609 Common Vulnerability Exposure (CVE) ID: CVE-2024-6610 Common Vulnerability Exposure (CVE) ID: CVE-2024-6611 Common Vulnerability Exposure (CVE) ID: CVE-2024-6612 Common Vulnerability Exposure (CVE) ID: CVE-2024-6613 Common Vulnerability Exposure (CVE) ID: CVE-2024-6614 Common Vulnerability Exposure (CVE) ID: CVE-2024-6615 Common Vulnerability Exposure (CVE) ID: CVE-2024-7518 Common Vulnerability Exposure (CVE) ID: CVE-2024-7519 Common Vulnerability Exposure (CVE) ID: CVE-2024-7520 Common Vulnerability Exposure (CVE) ID: CVE-2024-7521 Common Vulnerability Exposure (CVE) ID: CVE-2024-7522 Common Vulnerability Exposure (CVE) ID: CVE-2024-7524 Common Vulnerability Exposure (CVE) ID: CVE-2024-7525 Common Vulnerability Exposure (CVE) ID: CVE-2024-7526 Common Vulnerability Exposure (CVE) ID: CVE-2024-7527 Common Vulnerability Exposure (CVE) ID: CVE-2024-7528 Common Vulnerability Exposure (CVE) ID: CVE-2024-7529 Common Vulnerability Exposure (CVE) ID: CVE-2024-7531 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |