rpm package
suse/MozillaFirefox&distro=SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS
Vulnerabilities (360)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-11699 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < | ||
| CVE-2024-11698 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or acce | ||
| CVE-2024-11697 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thu | ||
| CVE-2024-11696 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation proces | ||
| CVE-2024-11695 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5. | ||
| CVE-2024-11694 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. T | ||
| CVE-2024-11693 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbir | ||
| CVE-2024-11692 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5. | ||
| CVE-2024-11691 | — | < 128.5.0-150200.152.161.1 | 128.5.0-150200.152.161.1 | Nov 26, 2024 | Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerabili | ||
| CVE-2024-10467 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < | ||
| CVE-2024-10466 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. | ||
| CVE-2024-10465 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | A clipboard "paste" button could persist across tabs which allowed a spoofing attack. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. | ||
| CVE-2024-10464 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunder | ||
| CVE-2024-10463 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132. | ||
| CVE-2024-10462 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | Truncation of a long URL could have allowed origin spoofing in a permission prompt. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. | ||
| CVE-2024-10461 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header was not respected and did not force a download, which could allow XSS attacks. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 13 | ||
| CVE-2024-10460 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. | ||
| CVE-2024-10459 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132. | ||
| CVE-2024-10458 | — | < 128.4.0-150200.152.158.1 | 128.4.0-150200.152.158.1 | Oct 29, 2024 | A permission leak could have occurred from a trusted site to an untrusted site via `embed` or `object` elements. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132. | ||
| CVE-2024-9680 | — | KEV | < 128.3.1-150200.152.155.1 | 128.3.1-150200.152.155.1 | Oct 9, 2024 | An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 1 |
- CVE-2024-11699Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox <
- CVE-2024-11698Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or acce
- CVE-2024-11697Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thu
- CVE-2024-11696Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation proces
- CVE-2024-11695Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
- CVE-2024-11694Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. T
- CVE-2024-11693Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
The executable file warning was not presented when downloading .library-ms files. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbir
- CVE-2024-11692Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5.
- CVE-2024-11691Nov 26, 2024affected < 128.5.0-150200.152.161.1fixed 128.5.0-150200.152.161.1
Certain WebGL operations on Apple silicon M series devices could have lead to an out-of-bounds write and memory corruption due to a flaw in Apple's GPU driver. *This bug only affected the application on Apple M series hardware. Other platforms were unaffected.* This vulnerabili
- CVE-2024-10467Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox <
- CVE-2024-10466Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
- CVE-2024-10465Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
A clipboard "paste" button could persist across tabs which allowed a spoofing attack. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
- CVE-2024-10464Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunder
- CVE-2024-10463Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132.
- CVE-2024-10462Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
Truncation of a long URL could have allowed origin spoofing in a permission prompt. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
- CVE-2024-10461Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header was not respected and did not force a download, which could allow XSS attacks. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 13
- CVE-2024-10460Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
- CVE-2024-10459Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132.
- CVE-2024-10458Oct 29, 2024affected < 128.4.0-150200.152.158.1fixed 128.4.0-150200.152.158.1
A permission leak could have occurred from a trusted site to an untrusted site via `embed` or `object` elements. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132.
- affected < 128.3.1-150200.152.155.1fixed 128.3.1-150200.152.155.1
An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 1
Page 1 of 18