Summary
The host is installed with Mozilla Seamonkey and is prone to multiple vulnerabilities.
Vulnerability:
Refer to the reference links for more information on the vulnerabilities.
Impact
Successful exploitation could result in remote arbitrary code execution, bypass security restrictions, sensitive information disclosure, cross site scripting attacks and execute JavaScript code with chrome privileges.
Impact Level: System
Solution
Upgrade to Seamonkey version 1.1.14 or later
http://www.seamonkey-project.org/releases/
Affected
Seamonkey version prior to 1.1.14 on Windows.
References
- http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-67.html
- http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-5500, CVE-2008-5501, CVE-2008-5502, CVE-2008-5503, CVE-2008-5506, CVE-2008-5507, CVE-2008-5508, CVE-2008-5510, CVE-2008-5511, CVE-2008-5512 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Acrobat Multiple Vulnerabilities - 01 Jan14 (Mac OS X)
- Adobe Flash Player Buffer Overflow Vulnerability - Apr14 (Linux)
- Adobe AIR Multiple Vulnerabilities -02 April 13 (Windows)
- Adobe AIR Code Execution and DoS Vulnerabilities Nov13 (Windows)
- Adobe Acrobat and Reader PDF Handling Code Execution Vulnerability (Linux)