TITLE: Mozilla SeaMonkey Multiple Vulnerabilities SECUNIA ADVISORY ID: SA29547 VERIFY ADVISORY: http://secunia.com/advisories/29547/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access WHERE: From remote SOFTWARE: Mozilla SeaMonkey 1.1.x http://secunia.com/product/14383/ DESCRIPTION: Some vulnerabilities and weaknesses have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system. For more information: SA29526 The vulnerabilities are reported in versions prior to 1.1.9. SOLUTION: Update to version 1.1.9. ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2008/mfsa2008-14.html http://www.mozilla.org/security/announce/2008/mfsa2008-15.html http://www.mozilla.org/security/announce/2008/mfsa2008-16.html http://www.mozilla.org/security/announce/2008/mfsa2008-17.html http://www.mozilla.org/security/announce/2008/mfsa2008-18.html http://www.mozilla.org/security/announce/2008/mfsa2008-19.html OTHER REFERENCES: SA29526: http://secunia.com/advisories/29526/ ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts.