Mozilla Products Information Disclosure and Security Bypass Vulnerabilities (Windows)

Summary
The host is installed with Mozilla firefox/seamonkey and is prone to information disclosure and security bypass vulnerabilities.
Impact
Successful exploitation will allow attackers to obtain sensitive information and bypass the application's security mechanism. Impact Level: Application
Solution
Upgrade to Mozilla Firefox version 6.0 or later, For updates refer to http://www.mozilla.com/en-US/firefox/all.html Upgrade to SeaMonkey version to 2.3 or later http://www.mozilla.org/projects/seamonkey/
Insight
The flaws are due to implementation errors, - In Content Security Policy (CSP) violation reports, which fails to remove proxy-authorization credentials from the listed request headers. - In digital signatures for JAR files, which fails to prevent calls from unsigned JavaScript code to signed code.
Affected
SeaMonkey version 2.0 through 2.2 Mozilla Firefox version 4.x through 5
References