Detect date
?
|
09/22/2015 |
Severity
?
|
Critical |
Description
|
Multiple vulnerabilities were found in SeaMonkey. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions and spoof user interface. Below is a complete list of vulnerabilities:
|
Affected products
|
SeaMonkey versions earlier than 2.38 |
Solution
|
Update to the latest version |
Original advisories
|
|
Impacts
?
|
ACE [?] DoS [?] SB [?] SUI [?] |
Related products
|
Mozilla SeaMonkey |
CVE-IDS
?
|
CVE-2015-71807.5Critical
CVE-2015-71797.5Critical CVE-2015-71787.5Critical CVE-2015-71777.5Critical CVE-2015-71767.5Critical CVE-2015-71757.5Critical CVE-2015-71747.5Critical CVE-2015-45227.5Critical CVE-2015-45217.5Critical CVE-2015-45206.4High CVE-2015-45194.3Warning CVE-2015-45177.5Critical CVE-2015-45169.3Critical CVE-2015-45126.4High CVE-2015-45116.8High CVE-2015-45106.8High CVE-2015-45097.5Critical CVE-2015-45082.6Warning CVE-2015-45075.1High CVE-2015-45066.8High CVE-2015-45046.4High CVE-2015-45035.0Critical CVE-2015-45024.3Warning CVE-2015-45017.5Critical CVE-2015-45007.5Critical |
Find out the statistics of the vulnerabilities spreading in your region |