Risk | High |
Patch available | YES |
Number of vulnerabilities | 34 |
CVE-ID | CVE-2022-2200 CVE-2022-2505 CVE-2022-34468 CVE-2022-34469 CVE-2022-34470 CVE-2022-34471 CVE-2022-34472 CVE-2022-34473 CVE-2022-34474 CVE-2022-34475 CVE-2022-34476 CVE-2022-34477 CVE-2022-34478 CVE-2022-34479 CVE-2022-34480 CVE-2022-34481 CVE-2022-34482 CVE-2022-34483 CVE-2022-34484 CVE-2022-34485 CVE-2022-36314 CVE-2022-36318 CVE-2022-36319 CVE-2022-38472 CVE-2022-38473 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 CVE-2022-40956 CVE-2022-40957 CVE-2022-40958 CVE-2022-40959 CVE-2022-40960 CVE-2022-40962 |
CWE-ID | CWE-94 CWE-119 CWE-254 CWE-416 CWE-807 CWE-388 CWE-20 CWE-346 CWE-939 CWE-1021 CWE-824 CWE-190 CWE-357 CWE-668 CWE-79 CWE-451 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Enterprise Storage Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Linux Enterprise Storage Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system SUSE Linux Enterprise Module for Desktop Applications Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing Operating systems & Components / Operating system SUSE Linux Enterprise Desktop Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications Operating systems & Components / Operating system MozillaFirefox-translations-other Operating systems & Components / Operating system package or component MozillaFirefox-translations-common Operating systems & Components / Operating system package or component MozillaFirefox-devel Operating systems & Components / Operating system package or component MozillaFirefox-debugsource Operating systems & Components / Operating system package or component MozillaFirefox-debuginfo Operating systems & Components / Operating system package or component MozillaFirefox-branding-upstream Operating systems & Components / Operating system package or component MozillaFirefox-branding-SLE Operating systems & Components / Operating system package or component MozillaFirefox Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 34 vulnerabilities.
EUVDB-ID: #VU64762
Risk: Medium
CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-2200
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation when handling JavaScript attributes. A remote attacker can pass undesired attributes to JavaScript object and perform prototype pollution and execute arbitrary JavaScript code in the browser.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65796
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-2505
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64752
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34468
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to improper handling of the CSP sandbox header without "allow-scripts" option. A remote attacker use an iframe to bypass implemented CSP restriction and execute scripts if the user clicks on a javascript:
link.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64758
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34469
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error when handling TLC certificate errors on a domain protected by the HSTS header. A remote attacker can trick the victim into bypassing the error using the presented browser option.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64751
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-34470
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in nsSHistory when handling XML documents. A remote attacker can trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64759
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34471
CWE-ID:
CWE-807 - Reliance on Untrusted Inputs in a Security Decision
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to force downgrade existing browser addons.
The vulnerability exists due to missing verification of the advertised version when installing addon updates. When downloading an update for an addon, the downloaded addon update's version is not verified to match the version selected from the manifest. If the manifest had been tampered with on the server, an attacker could trick the browser into downgrading the addon to a prior version.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64760
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34472
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to influence browser behavior.
The vulnerability exists due to improper error handling when processing unavailable PAC file. If a PAC URL is set and the server that hosts the PAC is unreachable, OCSP requests are blocked, resulting in incorrect error pages being shown.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64767
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34473
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to improper handling of thexlink:href
attribute of SVG <use>
tags. A remote attacker can bypass the HTML Sanitizerand perform XSS attacks.Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64757
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34474
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error when handling sandboxed iframes with allow-top-navigation-by-user-activation
. A remote attacker can pass a redirect header to an external protocol to the browser and force the browser to process the redirect. The browser however will prompt the user as appropriate.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64766
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34475
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to improper handling of SVG <use>
tags that referenced a same-origin document. A remote attacker can bypass the HTML Sanitizer API by referencing a same-origin JavaScript file containing the script to be executed.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64755
Risk: Medium
CVSSv4.0: 4.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34476
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a spoofing attack.
The vulnerability exists due to insufficient validation of an indefinite SEQUENCE inside an indefinite GROUP when parsing ASN.1. A remote attacker can trick the browser into accessing a malformed ASN.1 and perform spoofing attack.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64765
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34477
CWE-ID:
CWE-346 - Origin Validation Error
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to origin validation error. The MediaError message property should be consistent to avoid leaking information about cross-origin resources, however for a same-site cross-origin resource, the message could have leaked information enabling XS-Leaks attacks.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64761
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34478
CWE-ID:
CWE-939 - Improper Authorization in Handler for Custom URL Scheme
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insecure usage of URI handlers that allow usage of ms-msdt
, search
, and search-ms
protocols. A remote attacker can trick the victim to click on a specially crafted link and execute arbitrary code on the system, if the victim accepts the browser prompt.
The vulnerability affects Firefox on Windows.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64750
Risk: Medium
CVSSv4.0: 4.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34479
CWE-ID:
CWE-1021 - Improper Restriction of Rendered UI Layers or Frames
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to improper handling of resizing event for a popup window. A remote attacker can create a specially crafted website that can create a resized popup to overlay the address bar with its own content and perform spoofing attack.
Note, the vulnerability affects Linux installations only.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64764
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-34480
CWE-ID:
CWE-824 - Access of Uninitialized Pointer
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to crash the browser.
The vulnerability exists due to a boundary error within the lg_init()
function when handling several allocations. A remote attacker can cause browser crash.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64756
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34481
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in the nsTArray_Impl::ReplaceElementsAt()
function. A remote attacker can trick the victim to visit a specially crafted website, trigger an integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64753
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34482
CWE-ID:
CWE-357 - Insufficient UI Warning of Dangerous Operations
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient UI warning when performing drag and drop operations. A remote attacker can trick the victim to drag and drop an image to a filesystem, manipulate the resulting filename to contain executable extension and execute arbitrary application on the system.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64754
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-34483
CWE-ID:
CWE-357 - Insufficient UI Warning of Dangerous Operations
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient UI warning when performing drag and drop operations. A remote attacker can trick the victim to drag and drop an image to a filesystem, manipulate the resulting filename to contain executable extension and execute arbitrary application on the system.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64763
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-34484
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64768
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-34485
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65794
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-36314
CWE-ID:
CWE-668 - Exposure of resource to wrong sphere
Exploit availability: No
DescriptionThe vulnerability allows an attacker to initiate unintended actions.
The vulnerability exists due to an error when opening .lnk shortcuts on the system. If the shortcut contains a link to an external resource the browser can initiate network requests from the operating system.
The vulnerability affects Windows installations only.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65795
Risk: Medium
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-36318
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when visiting directory listings for chrome://
URLs as source text. A remote attacker can execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65793
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-36319
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to an error, related to mouse pointer positioning when combining CSS properties for overflow and transform. A remote attacker can trick the victim into interacting with mouse cursor with different coordinates than displayed.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66719
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-38472
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of XSLT errors. A remote attacker can spoof the address bar and trick the user into submitting data intended for the spoofed origin.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66720
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-38473
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrectly imposed security restrictions on a cross-origin iframe referencing an XSLT document. A remote attacker can trick the victim to visit a specially crafted website and inherit the parent domain's permissions to access microphone or camera.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66725
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-38476
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a data race within the in the PK11_ChangePW
function. A remote attacker can trigger a use-after-free error and crash the browser.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66723
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-38477
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66724
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-38478
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67503
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-40956
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to some requests may ignore the CSP's base-uri settings when handling HTML base element injection. A remote attacker can force the browser to accept the injected element's base instead of the original code, leading to Content Security Policy bypass.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67504
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-40957
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to inconsistent data in instruction and data cache when creating wasm code. A remote attacker can trick the victim to open a specially crafted web page, trigger memory corruption and potentially execute arbitrary code.
Note, the vulnerability affects Firefox on ARM64 platforms only.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67502
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-40958
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to incorrect handling of cookies. A remote attacker with access to a shared subdomain can inject a cookies with certain special characters, bypass Secure Context restriction for cookies with __Host and __Secure prefix and overwrite these cookies, potentially allowing session fixation attacks.
Update the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67500
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-40959
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to incorrect initialization of FeaturePolicy on all pages during iframe navigation. A remote attacker can trick the victim to open a specially crafted website, bypass FeaturePolicy restrictions and force the browser to leak device permissions into untrusted subdocuments.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67501
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-40960
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error caused by a concurrent use of the URL parser with non-UTF-8 data. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67505
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-40962
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaFirefox to the latest version.
Vulnerable software versionsSUSE Enterprise Storage: 7.1
SUSE Manager Retail Branch Server: 4.1 - 4.3
SUSE Linux Enterprise Storage: 7.1
SUSE Manager Server: 4.1 - 4.3
SUSE Manager Proxy: 4.1 - 4.3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP3 - 15-SP4
SUSE Linux Enterprise Server for SAP: 15-SP2
SUSE Linux Enterprise Server: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise High Performance Computing: 15-SP2-LTSS - 15-SP4
SUSE Linux Enterprise Desktop: 15-SP3 - 15-SP4
openSUSE Leap: 15.3 - 15.4
SUSE Linux Enterprise Server for SAP Applications: 15-SP3 - 15-SP4
MozillaFirefox-translations-other: before 102.3.0-150200.152.61.1
MozillaFirefox-translations-common: before 102.3.0-150200.152.61.1
MozillaFirefox-devel: before 102.3.0-150200.152.61.1
MozillaFirefox-debugsource: before 102.3.0-150200.152.61.1
MozillaFirefox-debuginfo: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-upstream: before 102.3.0-150200.152.61.1
MozillaFirefox-branding-SLE: before 102-150200.9.10.1
MozillaFirefox: before 102.3.0-150200.152.61.1
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20223396-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.