seamonkey
Page content
- Author: voroskoi
- Vulnerable: 1.1.1-1
- Unaffected: 1.1.2-1terminus1
Some vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user’s system.
- Errors in the JavaScript engine can be exploited to cause memory corruption and potentially to execute arbitrary code.
- An error in the “addEventListener” method can be exploited to inject script into another site, circumventing the browser’s same-origin policy. This could be used to access or modify sensitive information from the other site.
- An error in the handling of XUL popups can be exploited to spoof parts of the browser such as the location bar.
- Bug Tracker URL: http://bugs.frugalware.org/task/2123