Summary
The host is installed with Mozilla Seamonkey and is prone to multiple vulnerabilities.
Impact
Successful exploitation could result in Information Disclosure, XSS, Script Injection, Memory Corruption, CSRF, Arbitrary JavaScript code execution or can cause denial of service attacks.
Impact Level: System/Application
Solution
Upgrade to Seamonkey version 1.1.17
http://www.seamonkey-project.org/releases
Insight
For more information about vulnerabilities on Seamonkey, go through the links mentioned in references.
Affected
Seamonkey version prior to 1.1.17 on Windows.
References
- http://secunia.com/advisories/34835
- http://www.mozilla.org/security/announce/2009/mfsa2009-14.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-16.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-17.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-18.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-19.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-21.html
- http://www.mozilla.org/security/announce/2009/mfsa2009-22.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2009-1302, CVE-2009-1303, CVE-2009-1304, CVE-2009-1305, CVE-2009-1306, CVE-2009-1307, CVE-2009-1308, CVE-2009-1309, CVE-2009-1311, CVE-2009-1312 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Struts2 showcase namespace XSS Vulnerability
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability
- An Image Gallery Multiple Cross-Site Scripting Vulnerability
- Andromeda Streaming MP3 Server Cross Site Scripting Vulnerability
- AdaptCMS 'init.php' Remote File Include Vulnerability