![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.2.1.2024.55 |
Kategorie: | General |
Titel: | Mozilla Firefox Security Advisory (MFSA2024-55) - Linux |
Zusammenfassung: | This host is missing a security update for Mozilla Firefox. |
Beschreibung: | Summary: This host is missing a security update for Mozilla Firefox. Vulnerability Insight: CVE-2024-10458: Permission leak via embed or object elements A permission leak could have occurred from a trusted site to an untrusted site via embed or object elements. CVE-2024-10459: Use-after-free in layout with accessibility An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. CVE-2024-10460: Confusing display of origin for external protocol handler prompt The origin of an external protocol handler prompt could have been obscured using a data: URL within an iframe. CVE-2024-10461: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response In multipart/x-mixed-replace responses, Content-Disposition: attachment in the response header was not respected and did not force a download, which could allow XSS attacks. CVE-2024-10462: Origin of permission prompt could be spoofed by long URL Truncation of a long URL could have allowed origin spoofing in a permission prompt. CVE-2024-10463: Cross origin video frame leak Video frames could have been leaked between origins in some situations. CVE-2024-10468: Race conditions in IndexedDB Potential race conditions in IndexedDB could have caused memory corruption, leading to a potentially exploitable crash. CVE-2024-10464: History interface could have been used to cause a Denial of Service condition in the browser Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. CVE-2024-10465: Clipboard 'paste' button persisted across tabs A clipboard 'paste' button could persist across tabs which allowed a spoofing attack. CVE-2024-10466: DOM push subscription message could hang Firefox By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. CVE-2024-10467: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. Affected Software/OS: Firefox version(s) below 132. Solution: The vendor has released an update. Please see the reference(s) for more information. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-10458 Common Vulnerability Exposure (CVE) ID: CVE-2024-10459 Common Vulnerability Exposure (CVE) ID: CVE-2024-10460 Common Vulnerability Exposure (CVE) ID: CVE-2024-10461 Common Vulnerability Exposure (CVE) ID: CVE-2024-10462 Common Vulnerability Exposure (CVE) ID: CVE-2024-10463 Common Vulnerability Exposure (CVE) ID: CVE-2024-10464 Common Vulnerability Exposure (CVE) ID: CVE-2024-10465 Common Vulnerability Exposure (CVE) ID: CVE-2024-10466 Common Vulnerability Exposure (CVE) ID: CVE-2024-10467 Common Vulnerability Exposure (CVE) ID: CVE-2024-10468 |
Copyright | Copyright (C) 2024 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |