SeaMonkey < 2.13.2 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 6613


The remote host has a web browser installed that is vulnerable to multiple vulnerabilities.


Versions of SeaMonkey prior to 2.13.2 are potentially affected by the following security issues :

- The true value of 'window.location' can be shadowed by user content through the use of the 'valueOf' method, which can be combined with some plugins to perform cross-site scripting attacks. (CVE-2012-4194)
- The 'CheckURL' function of 'window.location' can be forced to return the wrong calling document and principal, allowing a cross-site scripting attack. (CVE-2012-4195)
- It is possible to use property injection by prototype to bypass security wrapper protections on the 'Location' object, allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)


Upgrade to SeaMonkey 2.13.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 6613

Family: Web Clients

Published: 2012/10/31

Modified: 2016/12/06

Dependencies: 3538

Nessus ID: 62747

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 4.9


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 2012/10/27

Vulnerability Publication Date: 2012/10/27

Reference Information

CVE: CVE-2012-4194, CVE-2012-4195, CVE-2012-4196

BID: 56301, 56302, 56306