Update for Mozilla Firefox addressing critical security vulnerabilities including code execution and sensitive information leakag
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | firefox security update | 8 Feb 200819:18 | – | centos |
![]() | seamonkey security update | 8 Feb 200819:04 | – | centos |
![]() | seamonkey security update | 11 Feb 200800:20 | – | centos |
![]() | thunderbird security update | 8 Feb 200819:19 | – | centos |
![]() | CentOS 4 / 5 : firefox (CESA-2008:0103) | 11 Feb 200800:00 | – | nessus |
![]() | RHEL 4 / 5 : firefox (RHSA-2008:0103) | 11 Feb 200800:00 | – | nessus |
![]() | Oracle Linux 4 / 5 : firefox (ELSA-2008-0103) | 12 Jul 201300:00 | – | nessus |
![]() | Scientific Linux Security Update : firefox on SL4.x, SL5.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | CentOS 3 / 4 : seamonkey (CESA-2008:0104) | 11 Feb 200800:00 | – | nessus |
![]() | Oracle Linux 3 / 4 : seamonkey (ELSA-2008-0104) | 12 Jul 201300:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | s390 | firefox | 1.5.0.12-9.el5 | firefox-1.5.0.12-9.el5.s390.rpm |
RedHat | 5 | i386 | firefox | 1.5.0.12-9.el5 | firefox-1.5.0.12-9.el5.i386.rpm |
RedHat | 5 | ppc | firefox | 1.5.0.12-9.el5 | firefox-1.5.0.12-9.el5.ppc.rpm |
RedHat | 5 | s390x | firefox-devel | 1.5.0.12-9.el5 | firefox-devel-1.5.0.12-9.el5.s390x.rpm |
RedHat | 5 | x86_64 | firefox-devel | 1.5.0.12-9.el5 | firefox-devel-1.5.0.12-9.el5.x86_64.rpm |
RedHat | 4 | s390 | firefox | 1.5.0.12-0.10.el4 | firefox-1.5.0.12-0.10.el4.s390.rpm |
RedHat | 5 | ia64 | firefox-devel | 1.5.0.12-9.el5 | firefox-devel-1.5.0.12-9.el5.ia64.rpm |
RedHat | 4 | src | firefox | 1.5.0.12-0.10.el4 | firefox-1.5.0.12-0.10.el4.src.rpm |
RedHat | 5 | s390 | firefox-devel | 1.5.0.12-9.el5 | firefox-devel-1.5.0.12-9.el5.s390.rpm |
RedHat | 5 | src | firefox | 1.5.0.12-9.el5 | firefox-1.5.0.12-9.el5.src.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo