This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote Windows host contains a web browser that is affected by a
signature forgery vulnerability.
The version of SeaMonkey installed on the remote host is prior to
2.29.1. It is, therefore, affected by a flaw in the Network Security
Services (NSS) library, which is due to lenient parsing of ASN.1
values involved in a signature and can lead to the forgery of RSA
signatures, such as SSL certificates.
See also :
Upgrade to SeaMonkey 2.29.1 or later.
Risk factor :
High / CVSS Base Score : 8.8
CVSS Temporal Score : 7.3
Public Exploit Available : true