The remote host is running a version of SeaMonkey earlier than 1.1.19. Such versions are potentially affected by multiple vulnerabilities :
The columns of a XUL tree element could be manipulated in a particular way which would leave a pointer owned by the column pointing to freed memory. (MFSA 2009-49)
A heap-based overflow exists in Mozillaβs string to floating point number conversion routines. (MFSA 2009-59)
It is possible to obfuscate the name of files to be downloaded by using a right-to-left override character (RTL). (MFSA 2009-62)
Mozillaβs NTLM implementation is vulnerable to reflection attacks in which NTLM credentials from one application could be forwarded to another arbitrary application. (MFSA 2009-68)
Scriptable plugin content, such as Flash objects, can be loaded and executed by embedding the content in an iframe inside the message. (MFSA 2010-06)
Multiple memory corruption vulnerabilities which could potentially lead to the execution of arbitrary code. (MFSA 2010-07)
Binary data 5479.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2072
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3385
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0161
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0163
www.mozilla.org/security/announce/2009/mfsa2009-49.html
www.mozilla.org/security/announce/2009/mfsa2009-59.html
www.mozilla.org/security/announce/2009/mfsa2009-62.html
www.mozilla.org/security/announce/2009/mfsa2009-68.html
www.mozilla.org/security/announce/2010/mfsa2010-06.html
www.mozilla.org/security/announce/2010/mfsa2010-07.html
www.mozilla.org/security/known-vulnerabilities/seamonkey11.html#seamonkey1.1.19