rpm package
suse/MozillaFirefox&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2
pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2
Vulnerabilities (412)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-23981 | — | < 78.9.0-112.54.1 | 78.9.0-112.54.1 | Mar 31, 2021 | A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thun | ||
| CVE-2021-23982 | — | < 78.9.0-112.54.1 | 78.9.0-112.54.1 | Mar 31, 2021 | Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and T | ||
| CVE-2021-23984 | — | < 78.9.0-112.54.1 | 78.9.0-112.54.1 | Mar 31, 2021 | A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing cred | ||
| CVE-2021-23987 | — | < 78.9.0-112.54.1 | 78.9.0-112.54.1 | Mar 31, 2021 | Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vuln | ||
| CVE-2021-23964 | — | < 78.7.0-112.45.1 | 78.7.0-112.45.1 | Feb 26, 2021 | Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Fire | ||
| CVE-2021-23978 | — | < 78.8.0-112.51.1 | 78.8.0-112.51.1 | Feb 26, 2021 | Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Fire | ||
| CVE-2021-23953 | — | < 78.7.0-112.45.1 | 78.7.0-112.45.1 | Feb 26, 2021 | If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. | ||
| CVE-2021-23954 | — | < 78.7.0-112.45.1 | 78.7.0-112.45.1 | Feb 26, 2021 | Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. | ||
| CVE-2021-23960 | — | < 78.7.0-112.45.1 | 78.7.0-112.45.1 | Feb 26, 2021 | Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. | ||
| CVE-2021-23968 | — | < 78.8.0-112.51.1 | 78.8.0-112.51.1 | Feb 26, 2021 | If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such URIs. This vulnerability affe | ||
| CVE-2021-23969 | — | < 78.8.0-112.51.1 | 78.8.0-112.51.1 | Feb 26, 2021 | As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down to an origin to avoid unintent | ||
| CVE-2021-23973 | — | < 78.8.0-112.51.1 | 78.8.0-112.51.1 | Feb 26, 2021 | When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8. | ||
| CVE-2020-16044 | — | < 78.6.1-112.42.1 | 78.6.1-112.42.1 | Feb 9, 2021 | Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet. | ||
| CVE-2020-16042 | — | < 78.6.0-112.39.1 | 78.6.0-112.39.1 | Jan 8, 2021 | Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | ||
| CVE-2020-16012 | — | < 78.5.0-112.36.1 | 78.5.0-112.36.1 | Jan 8, 2021 | Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | ||
| CVE-2020-26971 | — | < 78.6.0-112.39.1 | 78.6.0-112.39.1 | Jan 7, 2021 | Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. | ||
| CVE-2020-26973 | — | < 78.6.0-112.39.1 | 78.6.0-112.39.1 | Jan 7, 2021 | Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. | ||
| CVE-2020-26974 | — | < 78.6.0-112.39.1 | 78.6.0-112.39.1 | Jan 7, 2021 | When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird < | ||
| CVE-2020-26976 | — | < 78.7.0-112.45.1 | 78.7.0-112.45.1 | Jan 7, 2021 | When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affe | ||
| CVE-2020-26978 | — | < 78.6.0-112.39.1 | 78.6.0-112.39.1 | Jan 7, 2021 | Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6. |
- CVE-2021-23981Mar 31, 2021affected < 78.9.0-112.54.1fixed 78.9.0-112.54.1
A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thun
- CVE-2021-23982Mar 31, 2021affected < 78.9.0-112.54.1fixed 78.9.0-112.54.1
Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and T
- CVE-2021-23984Mar 31, 2021affected < 78.9.0-112.54.1fixed 78.9.0-112.54.1
A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing cred
- CVE-2021-23987Mar 31, 2021affected < 78.9.0-112.54.1fixed 78.9.0-112.54.1
Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vuln
- CVE-2021-23964Feb 26, 2021affected < 78.7.0-112.45.1fixed 78.7.0-112.45.1
Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Fire
- CVE-2021-23978Feb 26, 2021affected < 78.8.0-112.51.1fixed 78.8.0-112.51.1
Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Fire
- CVE-2021-23953Feb 26, 2021affected < 78.7.0-112.45.1fixed 78.7.0-112.45.1
If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
- CVE-2021-23954Feb 26, 2021affected < 78.7.0-112.45.1fixed 78.7.0-112.45.1
Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
- CVE-2021-23960Feb 26, 2021affected < 78.7.0-112.45.1fixed 78.7.0-112.45.1
Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
- CVE-2021-23968Feb 26, 2021affected < 78.8.0-112.51.1fixed 78.8.0-112.51.1
If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such URIs. This vulnerability affe
- CVE-2021-23969Feb 26, 2021affected < 78.8.0-112.51.1fixed 78.8.0-112.51.1
As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down to an origin to avoid unintent
- CVE-2021-23973Feb 26, 2021affected < 78.8.0-112.51.1fixed 78.8.0-112.51.1
When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.
- CVE-2020-16044Feb 9, 2021affected < 78.6.1-112.42.1fixed 78.6.1-112.42.1
Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
- CVE-2020-16042Jan 8, 2021affected < 78.6.0-112.39.1fixed 78.6.0-112.39.1
Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- CVE-2020-16012Jan 8, 2021affected < 78.5.0-112.36.1fixed 78.5.0-112.36.1
Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- CVE-2020-26971Jan 7, 2021affected < 78.6.0-112.39.1fixed 78.6.0-112.39.1
Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- CVE-2020-26973Jan 7, 2021affected < 78.6.0-112.39.1fixed 78.6.0-112.39.1
Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- CVE-2020-26974Jan 7, 2021affected < 78.6.0-112.39.1fixed 78.6.0-112.39.1
When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird <
- CVE-2020-26976Jan 7, 2021affected < 78.7.0-112.45.1fixed 78.7.0-112.45.1
When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affe
- CVE-2020-26978Jan 7, 2021affected < 78.6.0-112.39.1fixed 78.6.0-112.39.1
Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
Page 1 of 21