![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.856856 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (SUSE-SU-2024:4326-1) |
Summary: | The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:4326-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'MozillaThunderbird' package(s) announced via the SUSE-SU-2024:4326-1 advisory. Vulnerability Insight: This update for MozillaThunderbird fixes the following issues: - CVE-2024-50336: Fixed insufficient MXC URI validation which could allow client-side path traversal (bsc#1234413) Other fixes: - Updated to Mozilla Thunderbird 128.5.2i (bsc#1234413): * fixed: Large virtual folders could be very slow * fixed: Message could disappear after moving from IMAP folder followed by Undo and Redo * fixed: XMPP chat did not display messages sent inside a CDATA element * fixed: Selected calendar day did not move forward at midnight * fixed: Today pane agenda sometimes scrolled for no apparent reason * fixed: CalDAV calendars without offline support could degrade start-up performance * fixed: Visual and UX improvements * fixed: Security fixes - Updated to Mozilla Thunderbird 128.5.1: * new: Add end of year donation appeal * fixed: Total message count for favorite folders did not work consistently Affected Software/OS: 'MozillaThunderbird' package(s) on openSUSE Leap 15.5, openSUSE Leap 15.6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-50336 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |