CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
96.5%
Multiple vulnerabilities were found in SeaMonkey. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
CVE-2015-7180 critical
CVE-2015-7179 critical
CVE-2015-7178 critical
CVE-2015-7177 critical
CVE-2015-7176 critical
CVE-2015-7175 critical
CVE-2015-7174 critical
CVE-2015-4522 critical
CVE-2015-4521 critical
CVE-2015-4520 high
CVE-2015-4519 warning
CVE-2015-4517 critical
CVE-2015-4516 critical
CVE-2015-4512 high
CVE-2015-4511 high
CVE-2015-4510 high
CVE-2015-4509 critical
CVE-2015-4508 warning
CVE-2015-4507 high
CVE-2015-4506 high
CVE-2015-4504 high
CVE-2015-4503 critical
CVE-2015-4502 warning
CVE-2015-4501 critical
CVE-2015-4500 critical
Update to the latest version
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.