coolsilikon.blogg.se

Seamonkey exe
Seamonkey exe







seamonkey exe

MFSA 2006-53 ( ): UniversalBrowserRead privilege escalation. Remote script execution vulnerability through a "poisoned" PAC file. MFSA 2006-52 ( ): PAC privilege escalation using Remote execution vulnerability, affects Firefox, Thunderbird, SeaMonkey. MFSA 2006-51 ( ): Privilege escalation using named-functions and redefined "new Object()". Multiple vulnerabilities which can lead to remote execution, affect Firefox, Thunderbird and SeaMonkey.

seamonkey exe

MFSA 2006-50 ( ): JavaScript engine vulnerabilities MFSA 2006-49 ( ): Heap buffer overwrite on malformed vCard, affects Thunderbird and SeaMonkey. Remote execution vulnerability, affects Firefox, Thunderbird and SeaMonkey. MFSA 2006-48 ( ): JavaScript new Function race condition. Information leaking vulnerability, can be combined with XSS, although limited. MFSA 2006-47 ( ): Native DOM methods can be hijacked across domains. Remote execution vulnerability, affects Firefox and SeaMonkey. MFSA 2006-46 ( ): Memory corruption with simultaneous events. MFSA 2006-45 ( ): Javascript navigator Object Vulnerability.Īnother remote execution vulnerability, affects Firefox 1.5 and SeaMonkey. As Thunderbird uses the same browser engine as Firefox it is vulnerable to this as well, but the JavaScript parsing function in e-mails is not turned on by default (and we recommend that it stays turned off). This vulnerability allows remote execution and affects only Firefox 1.5 and SeaMonkey 1.0.

#Seamonkey exe code#

MFSA 2006-44 ( ): Code execution through deleted frame reference. Here's a short overview of the vulnerabilities that have been fixed: New versions fix numerous security vulnerabilities, of which some are rated critical. The Mozilla Foundation released new versions of Firefox, Thunderbird and SeaMonkey products.









Seamonkey exe