Описание
Multiple vulnerabilities were found in SeaMonkey. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
- Multiple memory corruption vulnerabilities in SeaMonkey can be exploited remotely to cause denial of service or execute arbitrary code;
- Memory leak vulnerability in SeaMonkey can be exploited to bypass security restrictions;
- Vulnerability related to ECMAScript 5 API in SeaMonkey can be exploited to execute arbitrary code;
- Vulnerability related to dragging and dropping images in SeaMonkey can be exploited to bypass security restrictions;
- Vulnerability related to handling of CORS preflight request headers in SeaMonkey can be exploited to bypass security restrictions;
- Memory safety vulnerabilities in libGLES in the ANGLE graphics library in SeaMonkey can be exploited to cause denial of service;
- Out of bounds read vulnerability in SeaMonkey can be exploited to cause denial of service;
- Vulnerability related to using the debugger API in SeaMonkey can be exploited to cause denial of service;
- Vulnerability related to manipulating the loaded URL in SeaMonkey can be exploited to spoof user interface;
- Use-after-free vulnerability in SeaMonkey can be exploited to cause denial of service;
- Buffer overflow vulnerability in SeaMonkey can be exploited to cause denial of service;
- Out of bounds read vulnerability in SeaMonkey can be exploited to bypass security restrictions;
- Vulnerability related to creating a scripted proxy by web page in SeaMonkey can be exploited to bypass security restrictions.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2015-7180 critical
- CVE-2015-7179 critical
- CVE-2015-7178 critical
- CVE-2015-7177 critical
- CVE-2015-7176 critical
- CVE-2015-7175 critical
- CVE-2015-7174 critical
- CVE-2015-4522 critical
- CVE-2015-4521 critical
- CVE-2015-4520 high
- CVE-2015-4519 warning
- CVE-2015-4517 critical
- CVE-2015-4516 critical
- CVE-2015-4512 high
- CVE-2015-4511 high
- CVE-2015-4510 high
- CVE-2015-4509 critical
- CVE-2015-4508 warning
- CVE-2015-4507 high
- CVE-2015-4506 high
- CVE-2015-4504 high
- CVE-2015-4503 critical
- CVE-2015-4502 warning
- CVE-2015-4501 critical
- CVE-2015-4500 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!