Known vulnerabilities in openEuler firefox - page 8

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › openEuler › firefox

Known vulnerabilities in openEuler firefox - page 8

Vendor: openEuler
Website: https://www.openeuler.org/
Total Security Bulletins: 147
140.9.1-1 140.9.0-1 140.8.0-1 140.7.0-1 140.5.0-1 140.4.0-3 140.4.0-2 140.4.0-1 140.3.1-1 128.14.0-1 128.13.0-1 128.12.0-1 128.11.0-1 128.10.1-1 128.10.0-1 128.9.0-1 79.0-34 128.8.0-1 128.7.0-1 128.6.0-1 128.5.0-1 128.4.0-2 128.4.0-1 128.3.0-3 79.0-32 128.3.0-2 115.15.0-1 79.0-31 102.15.0-7 115.14.0-1 79.0-30 115.13.0-2 115.13.0-1 79.0-28 79.0-26 115.12.0-1 79.0-20 79.0-21 79.0-19 79.0-18 79.0-17 79.0-16 102.15.0-5 79.0-15 79.0-14 102.15.0-2 102.14.0-1 79.0-12 79.0-13 79.0-9 79.0-8 62.0.3-8 62.0.3-5

Security bulletins (147)

Secuity bulletin Severity Status Published
SB2023072922: openEuler 20.03 LTS SP3 update for firefox High
Patched
29.07.2023
SB2023072921: openEuler 20.03 LTS SP1 update for firefox High
Patched
29.07.2023
SB2022111176: openEuler 22.03 LTS update for firefox High
Patched
11.11.2022
SB2022102681: openEuler update for firefox High
Patched
26.10.2022
SB2022032241: openEuler update for firefox High
Patched
22.03.2022
SB2021040741: openEuler update for firefox Critical
Patched Exploited
07.04.2021
SB20200611172: openEuler 20.03 LTS update for firefox-62.0.3-5 High
Patched
11.06.2020


Showing elements 141 - 160 out of 147

  • Previous
  • 5
  • 6
  • 7
  • 8
  • Next

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or