seamonkey

Page content
  • Author: voroskoi
  • Vulnerable: 1.1.1-1
  • Unaffected: 1.1.2-1terminus1

Some vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user’s system.

  1. Errors in the JavaScript engine can be exploited to cause memory corruption and potentially to execute arbitrary code.
  2. An error in the “addEventListener” method can be exploited to inject script into another site, circumventing the browser’s same-origin policy. This could be used to access or modify sensitive information from the other site.
  3. An error in the handling of XUL popups can be exploited to spoof parts of the browser such as the location bar.

CVEs: