The remote host has a web browser installed that is vulnerable to multiple attack vectors.
The remote host is running a version of SeaMonkey earlier than 2.0.4. Such versions are potentially affected by multiple security issues : - Multiple crashes can result in arbitrary code execution. (MFSA 2010-16) - A select event handler for XUL tree items can be called after the item is deleted. (MFSA 2010-17) - An error exists in the way '<option>' elements are inserted into a XUL tree '<optgroup>'. (MFSA 2010-18) - An error exists in the implementation of the 'windows.navigator.plugins' object. (MFSA 2010-19) - A browser applet can be used to turn a simple mouse click into a drag-and-drop action, potentially resulting in the unintended loading of resources in a user's browser. (MFSA 2010-20) Session renegotiations are not handled properly, which can be exploited to insert arbitrary plaintext by a man-in-the-middle. (MFSA 2010-22) - When an image points to a resource that redirects to a 'mailto: ' URL, the external mail handler application is launched. (MFSA 2010-23) - XML documents fail to call certain security checks when loading new content. (MFSA 2010-24)