GLSA-202012-02 : SeaMonkey: Multiple vulnerabilities

medium Nessus Plugin ID 143524
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-202012-02 (SeaMonkey: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in SeaMonkey. Please review referenced release notes for more details.
Impact :

Please review the referenced release notes for details.
Workaround :

There is no known workaround at this time.


All SeaMonkey users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=www-client/seamonkey-' Gentoo has discontinued support for the SeaMonkey binary package. We recommend that users unmerge the SeaMonkey binary package:
# emerge --unmerge “www-client/seamonkey-bin”
NOTE: The Gentoo developer(s) maintaining the SeaMonkey binary package have discontinued support at this time. It may be possible that a new Gentoo developer will update it at a later date. The alternative is using the standard SeaMonkey package.

See Also

Plugin Details

Severity: Medium

ID: 143524

File Name: gentoo_GLSA-202012-02.nasl

Version: 1.1

Type: local

Published: 12/7/2020

Updated: 12/7/2020

Dependencies: ssh_get_info.nasl

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:seamonkey, p-cpe:/a:gentoo:linux:seamonkey-bin, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 12/7/2020

Vulnerability Publication Date: 12/7/2020

Reference Information

GLSA: 202012-02