Mozilla SeaMonkey Multiple Vulnerabilities - August 13 (Windows)

Summary
The host is installed with Mozilla SeaMonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code, obtain potentially sensitive information, gain escalated privileges, bypass security restrictions, perform unauthorized actions and other attacks may also be possible.
Solution
Upgrade to version 2.20 or later, For updates refer to http://www.mozilla.org/projects/seamonkey
Insight
Multiple flaws due to, - Error in crypto.generateCRMFRequest function. - Does not properly restrict local-filesystem access by Java applets. - Multiple Unspecified vulnerabilities in the browser engine. - Web Workers implementation is not properly restrict XMLHttpRequest calls. - Usage of incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy. - The XrayWrapper implementation does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls. - Improper handling of interaction between FRAME elements and history. - Improper handling of WAV file by the nsCString::CharAt function. - Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function. - Use-after-free vulnerability in the nsINode::GetParentNode function.
Affected
Mozilla SeaMonkey before 2.20 on Windows
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References