Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> SeaMonkey < 1.0.6


Vulnerability Assessment Details

SeaMonkey < 1.0.6

Vulnerability Assessment Summary
Checks version of SeaMonkey

Detailed Explanation for this Vulnerability Assessment

Summary :

A web browser on the remote host is prone to multiple flaws.

Description :

The installed version of SeaMonkey contains various security issues,
some of which may lead to execution of arbitrary code on the affected
host subject to the user's rights.

See also :

http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
http://www.mozilla.org/security/announce/2006/mfsa2006-67.html

Solution :

Upgrade to SeaMonkey 1.0.6 or later.

Network Security Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Networks Security ID: 20957

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

IBM 4x 1GB PC2100 Server Memory 09N4308
$39.99
IBM 4x 1GB PC2100 Server Memory 09N4308 picture# IBM x3650 2x Intel Xeon Dual-Core 2.00GHz 5130 7GB NO Hard Drives
$399.0
# IBM x3650 2x Intel Xeon Dual-Core 2.00GHz 5130 7GB NO Hard Drives picture # Cisco Server WAE-674-K9 2.00Ghz 3x IBM 300GB 15k RPM 4GB Memory DVD-CD RW
$999.0
 # Cisco Server WAE-674-K9 2.00Ghz 3x IBM 300GB 15k RPM 4GB Memory DVD-CD RW  pictureINTEL XEON 1.5GHZ 1M 400 1.475V SERVER CPU PROCESSOR SL6GZ 59P6941 IBM XSERIES
$27.73
INTEL XEON 1.5GHZ 1M 400 1.475V SERVER CPU PROCESSOR SL6GZ 59P6941 IBM XSERIES picture


Discussions

No Discussions have been posted on this vulnerability.