Kaspersky ID:
KLA11454
Date de la détection:
09/22/2015
Mis à jour:
04/02/2025

Description

Multiple vulnerabilities were found in SeaMonkey. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions and spoof user interface.

Below is a complete list of vulnerabilities:

  1. Multiple memory corruption vulnerabilities in SeaMonkey can be exploited remotely to cause denial of service or execute arbitrary code;
  2. Memory leak vulnerability in SeaMonkey can be exploited to bypass security restrictions;
  3. Vulnerability related to ECMAScript 5 API in SeaMonkey can be exploited to execute arbitrary code;
  4. Vulnerability related to dragging and dropping images in SeaMonkey can be exploited to bypass security restrictions;
  5. Vulnerability related to handling of CORS preflight request headers in SeaMonkey can be exploited to bypass security restrictions;
  6. Memory safety vulnerabilities in libGLES in the ANGLE graphics library in SeaMonkey can be exploited to cause denial of service;
  7. Out of bounds read vulnerability in SeaMonkey can be exploited to cause denial of service;
  8. Vulnerability related to using the debugger API in SeaMonkey can be exploited to cause denial of service;
  9. Vulnerability related to manipulating the loaded URL in SeaMonkey can be exploited to spoof user interface;
  10. Use-after-free vulnerability in SeaMonkey can be exploited to cause denial of service;
  11. Buffer overflow vulnerability in SeaMonkey can be exploited to cause denial of service;
  12. Out of bounds read vulnerability in SeaMonkey can be exploited to bypass security restrictions;
  13. Vulnerability related to creating a scripted proxy by web page in SeaMonkey can be exploited to bypass security restrictions.

Fiches de renseignement originales

Produits associés

Liste CVE

  • CVE-2015-7180
    high
  • CVE-2015-7179
    high
  • CVE-2015-7178
    high
  • CVE-2015-7177
    high
  • CVE-2015-7176
    high
  • CVE-2015-7175
    high
  • CVE-2015-7174
    high
  • CVE-2015-4522
    high
  • CVE-2015-4521
    high
  • CVE-2015-4520
    high
  • CVE-2015-4519
    warning
  • CVE-2015-4517
    high
  • CVE-2015-4516
    critical
  • CVE-2015-4512
    high
  • CVE-2015-4511
    high
  • CVE-2015-4510
    high
  • CVE-2015-4509
    high
  • CVE-2015-4508
    warning
  • CVE-2015-4507
    high
  • CVE-2015-4506
    high
  • CVE-2015-4504
    high
  • CVE-2015-4503
    warning
  • CVE-2015-4502
    warning
  • CVE-2015-4501
    high
  • CVE-2015-4500
    high

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.