On 12/16/2008 12:09 PM, Robert Kaiser wrote: > Hi all, > > Today, the SeaMonkey project released a new version of its all-in-one > internet suite. SeaMonkey 1.1.14 closes several security vulnerabilities > and fixes several smaller problems found in previous versions. With > that, SeaMonkey stays at the same level of security as its sibling > Firefox 2, which is issuing updates for the same problems this week as well. > > The SeaMonkey team urges users of older SeaMonkey versions, including > the SeaMonkey 1.0.x series, which no longer receives security updates, > to upgrade. Additionally, the team continues to strongly urge people > still using the old Mozilla Suite or Netscape 4, 6 or 7 to upgrade to > the new SeaMonkey 1.1.14 version. All these older software packages > suffer from a large and steadily increasing number of security > vulnerabilities because they are no longer being maintained. SeaMonkey > 1.1.14 is a modern, drop-in replacement, providing the same familiar > suite functionality with additional features and fully up to date security. > > SeaMonkey 1.1.14 is available for free download from the open source > project's website at www.seamonkey-project.org. > > Full news article: > http://www.seamonkey-project.org/news#2008-12-16 > > Downloads for all available platforms and languages: > http://www.seamonkey-project.org/releases/#1.1.14 > > Release notes: > http://www.seamonkey-project.org/releases/seamonkey1.1.14/ > > Greetings, > > Robert Kaiser > SeaMonkey Council member
<http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html#seamonkey1.1.14> Shouldn't: Fixed in SeaMonkey 1.1.13 MFSA 2008-68 XSS and JavaScript privilege escalation MFSA 2008-67 Escaped null characters ignored by CSS parser MFSA 2008-66 Errors parsing URLs with leading whitespace and control characters MFSA 2008-65 Cross-domain data theft via script redirect error message MFSA 2008-64 XMLHttpRequest 302 response disclosure MFSA 2008-61 Information stealing via loadBindingDocument MFSA 2008-60 Crashes with evidence of memory corruption (rv:1.9.0.5/1.8.1.19) Read: Fixed in SeaMonkey 1.1.14 MFSA 2008-68 XSS and JavaScript privilege escalation MFSA 2008-67 Escaped null characters ignored by CSS parser MFSA 2008-66 Errors parsing URLs with leading whitespace and control characters MFSA 2008-65 Cross-domain data theft via script redirect error message MFSA 2008-64 XMLHttpRequest 302 response disclosure MFSA 2008-61 Information stealing via loadBindingDocument MFSA 2008-60 Crashes with evidence of memory corruption (rv:1.9.0.5/1.8.1.19) _______________________________________________ support-seamonkey mailing list [email protected] https://lists.mozilla.org/listinfo/support-seamonkey

