This update for MozillaFirefox to 68.2.0 ESR fixes the following issues :
Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).
Security issues fixed :
CVE-2019-15903: Fixed a heap overflow in the expat library (bsc#1149429).
CVE-2019-11757: Fixed a use-after-free when creating index updates in IndexedDB (bsc#1154738).
CVE-2019-11758: Fixed a potentially exploitable crash due to 360 Total Security (bsc#1154738).
CVE-2019-11759: Fixed a stack-based buffer overflow in HKDF output (bsc#1154738).
CVE-2019-11760: Fixed a stack-based buffer overflow in WebRTC networking (bsc#1154738).
CVE-2019-11761: Fixed an unintended access to a privileged JSONView object (bsc#1154738).
CVE-2019-11762: Fixed a same-origin-property violation (bsc#1154738).
CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
CVE-2019-11764: Fixed several memory safety bugs (bsc#1154738).
Non-security issues fixed: Firefox 60.7 ESR changed the user interface language (bsc#1137990).
Wrong Firefox GUI Language (bsc#1120374).
Fixed an inadvertent crash report transmission without user opt-in (bsc#1074235).
Firefox hangs randomly when browsing and scrolling (bsc#1043008).
Firefox stops loading page until mouse is moved (bsc#1025108).
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2019:2872-1.
# The text itself is copyright (C) SUSE.
#
include('compat.inc');
if (description)
{
script_id(130450);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/16");
script_cve_id(
"CVE-2016-2830",
"CVE-2016-5289",
"CVE-2016-5292",
"CVE-2016-9063",
"CVE-2016-9067",
"CVE-2016-9068",
"CVE-2016-9069",
"CVE-2016-9071",
"CVE-2016-9073",
"CVE-2016-9075",
"CVE-2016-9076",
"CVE-2016-9077",
"CVE-2017-7789",
"CVE-2018-5150",
"CVE-2018-5151",
"CVE-2018-5152",
"CVE-2018-5153",
"CVE-2018-5154",
"CVE-2018-5155",
"CVE-2018-5157",
"CVE-2018-5158",
"CVE-2018-5159",
"CVE-2018-5160",
"CVE-2018-5163",
"CVE-2018-5164",
"CVE-2018-5165",
"CVE-2018-5166",
"CVE-2018-5167",
"CVE-2018-5168",
"CVE-2018-5169",
"CVE-2018-5172",
"CVE-2018-5173",
"CVE-2018-5174",
"CVE-2018-5175",
"CVE-2018-5176",
"CVE-2018-5177",
"CVE-2018-5178",
"CVE-2018-5179",
"CVE-2018-5180",
"CVE-2018-5181",
"CVE-2018-5182",
"CVE-2018-5183",
"CVE-2019-11757",
"CVE-2019-11758",
"CVE-2019-11759",
"CVE-2019-11760",
"CVE-2019-11761",
"CVE-2019-11762",
"CVE-2019-11763",
"CVE-2019-11764",
"CVE-2019-15903"
);
script_name(english:"SUSE SLED12 / SLES12 Security Update : MozillaFirefox (SUSE-SU-2019:2872-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"This update for MozillaFirefox to 68.2.0 ESR fixes the following
issues :
Mozilla Firefox was updated to version 68.2.0 ESR (bsc#1154738).
Security issues fixed :
CVE-2019-15903: Fixed a heap overflow in the expat library
(bsc#1149429).
CVE-2019-11757: Fixed a use-after-free when creating index
updates in IndexedDB (bsc#1154738).
CVE-2019-11758: Fixed a potentially exploitable crash due to
360 Total Security (bsc#1154738).
CVE-2019-11759: Fixed a stack-based buffer overflow in HKDF
output (bsc#1154738).
CVE-2019-11760: Fixed a stack-based buffer overflow in
WebRTC networking (bsc#1154738).
CVE-2019-11761: Fixed an unintended access to a privileged
JSONView object (bsc#1154738).
CVE-2019-11762: Fixed a same-origin-property violation
(bsc#1154738).
CVE-2019-11763: Fixed an XSS bypass (bsc#1154738).
CVE-2019-11764: Fixed several memory safety bugs
(bsc#1154738).
Non-security issues fixed: Firefox 60.7 ESR changed the user interface
language (bsc#1137990).
Wrong Firefox GUI Language (bsc#1120374).
Fixed an inadvertent crash report transmission without user opt-in
(bsc#1074235).
Firefox hangs randomly when browsing and scrolling (bsc#1043008).
Firefox stops loading page until mouse is moved (bsc#1025108).
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010399");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010405");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010406");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010408");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010409");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010421");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010423");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010424");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010425");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1010426");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1025108");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1043008");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1047281");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1074235");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1092611");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1120374");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149429");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154738");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=959933");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=983922");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-2830/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-5289/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-5292/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9063/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9067/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9068/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9069/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9071/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9073/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9075/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9076/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2016-9077/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2017-7789/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5150/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5151/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5152/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5153/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5154/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5155/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5157/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5158/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5159/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5160/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5163/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5164/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5165/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5166/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5167/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5168/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5169/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5172/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5173/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5174/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5175/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5176/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5177/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5178/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5179/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5180/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5181/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5182/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5183/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11757/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11758/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11759/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11760/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11761/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11762/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11763/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11764/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-15903/");
# https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5c4f3883");
script_set_attribute(attribute:"solution", value:
"To install this SUSE Security Update use the SUSE recommended
installation methods like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product :
SUSE OpenStack Cloud Crowbar 8:zypper in -t patch
SUSE-OpenStack-Cloud-Crowbar-8-2019-2872=1
SUSE OpenStack Cloud 8:zypper in -t patch
SUSE-OpenStack-Cloud-8-2019-2872=1
SUSE OpenStack Cloud 7:zypper in -t patch
SUSE-OpenStack-Cloud-7-2019-2872=1
SUSE Linux Enterprise Software Development Kit 12-SP5:zypper in -t
patch SUSE-SLE-SDK-12-SP5-2019-2872=1
SUSE Linux Enterprise Software Development Kit 12-SP4:zypper in -t
patch SUSE-SLE-SDK-12-SP4-2019-2872=1
SUSE Linux Enterprise Server for SAP 12-SP3:zypper in -t patch
SUSE-SLE-SAP-12-SP3-2019-2872=1
SUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch
SUSE-SLE-SAP-12-SP2-2019-2872=1
SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch
SUSE-SLE-SAP-12-SP1-2019-2872=1
SUSE Linux Enterprise Server 12-SP5:zypper in -t patch
SUSE-SLE-SERVER-12-SP5-2019-2872=1
SUSE Linux Enterprise Server 12-SP4:zypper in -t patch
SUSE-SLE-SERVER-12-SP4-2019-2872=1
SUSE Linux Enterprise Server 12-SP3-LTSS:zypper in -t patch
SUSE-SLE-SERVER-12-SP3-2019-2872=1
SUSE Linux Enterprise Server 12-SP3-BCL:zypper in -t patch
SUSE-SLE-SERVER-12-SP3-BCL-2019-2872=1
SUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch
SUSE-SLE-SERVER-12-SP2-2019-2872=1
SUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch
SUSE-SLE-SERVER-12-SP2-BCL-2019-2872=1
SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch
SUSE-SLE-SERVER-12-SP1-2019-2872=1
SUSE Linux Enterprise Desktop 12-SP4:zypper in -t patch
SUSE-SLE-DESKTOP-12-SP4-2019-2872=1
SUSE Enterprise Storage 5:zypper in -t patch
SUSE-Storage-5-2019-2872=1
HPE Helion Openstack 8:zypper in -t patch
HPE-Helion-OpenStack-8-2019-2872=1");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-5151");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2018-5183");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/08/05");
script_set_attribute(attribute:"patch_publication_date", value:"2019/10/31");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/01");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:MozillaFirefox-translations-common");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES12" && (! preg(pattern:"^(1|2|3|4|5)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP1/2/3/4/5", os_ver + " SP" + sp);
if (os_ver == "SLED12" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP4", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES12", sp:"1", reference:"MozillaFirefox-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"1", reference:"MozillaFirefox-debuginfo-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"1", reference:"MozillaFirefox-debugsource-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"1", reference:"MozillaFirefox-devel-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"1", reference:"MozillaFirefox-translations-common-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"4", reference:"MozillaFirefox-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"4", reference:"MozillaFirefox-debuginfo-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"4", reference:"MozillaFirefox-debugsource-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"4", reference:"MozillaFirefox-translations-common-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"3", reference:"MozillaFirefox-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"3", reference:"MozillaFirefox-debuginfo-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"3", reference:"MozillaFirefox-debugsource-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"3", reference:"MozillaFirefox-translations-common-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"2", reference:"MozillaFirefox-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"2", reference:"MozillaFirefox-debuginfo-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"2", reference:"MozillaFirefox-debugsource-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"2", reference:"MozillaFirefox-devel-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"2", reference:"MozillaFirefox-translations-common-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"MozillaFirefox-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"MozillaFirefox-debuginfo-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"MozillaFirefox-debugsource-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"MozillaFirefox-translations-common-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLED12", sp:"4", cpu:"x86_64", reference:"MozillaFirefox-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLED12", sp:"4", cpu:"x86_64", reference:"MozillaFirefox-debuginfo-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLED12", sp:"4", cpu:"x86_64", reference:"MozillaFirefox-debugsource-68.2.0-109.95.2")) flag++;
if (rpm_check(release:"SLED12", sp:"4", cpu:"x86_64", reference:"MozillaFirefox-translations-common-68.2.0-109.95.2")) flag++;
if (flag)
{
set_kb_item(name:'www/0/XSS', value:TRUE);
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "MozillaFirefox");
}
Vendor | Product | Version | CPE |
---|---|---|---|
novell | suse_linux | mozillafirefox | p-cpe:/a:novell:suse_linux:mozillafirefox |
novell | suse_linux | mozillafirefox-debuginfo | p-cpe:/a:novell:suse_linux:mozillafirefox-debuginfo |
novell | suse_linux | mozillafirefox-debugsource | p-cpe:/a:novell:suse_linux:mozillafirefox-debugsource |
novell | suse_linux | mozillafirefox-devel | p-cpe:/a:novell:suse_linux:mozillafirefox-devel |
novell | suse_linux | mozillafirefox-translations-common | p-cpe:/a:novell:suse_linux:mozillafirefox-translations-common |
novell | suse_linux | 12 | cpe:/o:novell:suse_linux:12 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5289
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5292
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9067
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9068
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9069
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9071
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9076
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5151
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5152
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5153
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5157
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5158
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5160
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5163
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5164
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5165
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5166
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5167
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5169
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5172
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5176
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5179
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5180
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5181
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5182
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
www.nessus.org/u?5c4f3883
bugzilla.suse.com/show_bug.cgi?id=1010399
bugzilla.suse.com/show_bug.cgi?id=1010405
bugzilla.suse.com/show_bug.cgi?id=1010406
bugzilla.suse.com/show_bug.cgi?id=1010408
bugzilla.suse.com/show_bug.cgi?id=1010409
bugzilla.suse.com/show_bug.cgi?id=1010421
bugzilla.suse.com/show_bug.cgi?id=1010423
bugzilla.suse.com/show_bug.cgi?id=1010424
bugzilla.suse.com/show_bug.cgi?id=1010425
bugzilla.suse.com/show_bug.cgi?id=1010426
bugzilla.suse.com/show_bug.cgi?id=1025108
bugzilla.suse.com/show_bug.cgi?id=1043008
bugzilla.suse.com/show_bug.cgi?id=1047281
bugzilla.suse.com/show_bug.cgi?id=1074235
bugzilla.suse.com/show_bug.cgi?id=1092611
bugzilla.suse.com/show_bug.cgi?id=1120374
bugzilla.suse.com/show_bug.cgi?id=1137990
bugzilla.suse.com/show_bug.cgi?id=1149429
bugzilla.suse.com/show_bug.cgi?id=1154738
bugzilla.suse.com/show_bug.cgi?id=959933
bugzilla.suse.com/show_bug.cgi?id=983922
www.suse.com/security/cve/CVE-2016-2830/
www.suse.com/security/cve/CVE-2016-5289/
www.suse.com/security/cve/CVE-2016-5292/
www.suse.com/security/cve/CVE-2016-9063/
www.suse.com/security/cve/CVE-2016-9067/
www.suse.com/security/cve/CVE-2016-9068/
www.suse.com/security/cve/CVE-2016-9069/
www.suse.com/security/cve/CVE-2016-9071/
www.suse.com/security/cve/CVE-2016-9073/
www.suse.com/security/cve/CVE-2016-9075/
www.suse.com/security/cve/CVE-2016-9076/
www.suse.com/security/cve/CVE-2016-9077/
www.suse.com/security/cve/CVE-2017-7789/
www.suse.com/security/cve/CVE-2018-5150/
www.suse.com/security/cve/CVE-2018-5151/
www.suse.com/security/cve/CVE-2018-5152/
www.suse.com/security/cve/CVE-2018-5153/
www.suse.com/security/cve/CVE-2018-5154/
www.suse.com/security/cve/CVE-2018-5155/
www.suse.com/security/cve/CVE-2018-5157/
www.suse.com/security/cve/CVE-2018-5158/
www.suse.com/security/cve/CVE-2018-5159/
www.suse.com/security/cve/CVE-2018-5160/
www.suse.com/security/cve/CVE-2018-5163/
www.suse.com/security/cve/CVE-2018-5164/
www.suse.com/security/cve/CVE-2018-5165/
www.suse.com/security/cve/CVE-2018-5166/
www.suse.com/security/cve/CVE-2018-5167/
www.suse.com/security/cve/CVE-2018-5168/
www.suse.com/security/cve/CVE-2018-5169/
www.suse.com/security/cve/CVE-2018-5172/
www.suse.com/security/cve/CVE-2018-5173/
www.suse.com/security/cve/CVE-2018-5174/
www.suse.com/security/cve/CVE-2018-5175/
www.suse.com/security/cve/CVE-2018-5176/
www.suse.com/security/cve/CVE-2018-5177/
www.suse.com/security/cve/CVE-2018-5178/
www.suse.com/security/cve/CVE-2018-5179/
www.suse.com/security/cve/CVE-2018-5180/
www.suse.com/security/cve/CVE-2018-5181/
www.suse.com/security/cve/CVE-2018-5182/
www.suse.com/security/cve/CVE-2018-5183/
www.suse.com/security/cve/CVE-2019-11757/
www.suse.com/security/cve/CVE-2019-11758/
www.suse.com/security/cve/CVE-2019-11759/
www.suse.com/security/cve/CVE-2019-11760/
www.suse.com/security/cve/CVE-2019-11761/
www.suse.com/security/cve/CVE-2019-11762/
www.suse.com/security/cve/CVE-2019-11763/
www.suse.com/security/cve/CVE-2019-11764/
www.suse.com/security/cve/CVE-2019-15903/