Some vulnerabilities have been reported in Mozilla Firefox, Thunderbird, and SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system
You need to log in to the Secunia Community to view the full description of this advisory
If you are not a member of the Secunia community, you can sign up here for free.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities
RE: Mozilla Firefox Cross-Domain "location" Object Access Vulnerability
11th Oct, 2012 11:55
Score: -10 Posts: 11 User Since: 14th Dec 2011 System Score: N/A Location: UK Last edited on 11th Oct, 2012 11:55
Just seen this http://www.pcadvisor.co.uk/news/security/3404407/f... so if you upgraded any PCs to FF16 then roll them back to FF15 ASAP. So to downgrade get the Firefox 15.0.1 installable and run that. It will seem as if you are upgrading but it will roll back to 15.0.1 safely with no loss of data or settings.
PSI will report an insecurity in FF but you will have to ignore that until Mozilla issue an updated and fixed version of FF.