Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2010:0113
The remote host is missing updates announced in
advisory RHSA-2010:0113.

SeaMonkey is an open source Web browser, email and newsgroup client, IRC
chat client, and HTML editor.

A use-after-free flaw was found in SeaMonkey. Under low memory conditions,
visiting a web page containing malicious content could result in SeaMonkey
executing arbitrary code with the privileges of the user running SeaMonkey.

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause SeaMonkey to crash or,
potentially, execute arbitrary code with the privileges of the user running
SeaMonkey. (CVE-2010-0159)

All SeaMonkey users should upgrade to these updated packages, which correct
these issues. After installing the update, SeaMonkey must be restarted for
the changes to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Critical

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1571
Bugtraq: 20100218 Secunia Research: Mozilla Firefox Memory Corruption Vulnerability (Google Search)
Debian Security Information: DSA-1999 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:015 (Google Search)
XForce ISS Database: mozilla-htmlparser-code-exec(56361)
Common Vulnerability Exposure (CVE) ID: CVE-2010-0159
XForce ISS Database: mozilla-browsereng-code-execution(56359)
CopyrightCopyright (c) 2010 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.