Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mozilla Products Multiple Information Disclosure Vulnerabilities - MAC OS X
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Mozilla firefox/seamonkey/thunderbird and is prone to multiple vulnerabilities.
Insight
Insight
The flaws are due to - An error in layout engine, executes different code for visited and unvisited links during the processing of CSS token sequences. - An error in JavaScript implementation, which does not properly restrict the set of values of objects returned by the getComputedStyle method. - An error in Cascading Style Sheets (CSS) implementation, which fails to handle the visited pseudo-class.
Affected Software
Affected Software
SeaMonkey version prior to 2.1, Thunderbird version prior to 3.3 and Mozilla Firefox version prior to 4.0 on MAC OS
Solution
Solution
Upgrade to Mozilla Firefox version 4.0 or later, Upgrade to SeaMonkey version to 2.1 or later, Upgrade to Thunderbird version 3.3 or later.
Common Vulnerabilities and Exposures (CVE)
References
- http://www.security-database.com/detail.php?alert=CVE-2010-5074
- http://www.security-database.com/detail.php?alert=CVE-2002-2436
- http://www.security-database.com/detail.php?alert=CVE-2002-2437
- http://vrda.jpcert.or.jp/feed/en/NISTNVD_CVE-2010-5074_AD_1.html
- http://www.mozilla.com/en-US/firefox/all.html
- http://www.mozillamessaging.com/en-US/thunderbird/
- http://www.mozilla.org/projects/seamonkey/