The successor of the Mozilla Application Suite
Originally based on the Netscape Communicator source, the SeaMonkey
project grew to be the most advanced web browser currently available.
It supports new techniques like CSS2, MathML, SVG, XML, transparent
PNGs, and its look is fully theme-able.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Evergreen:11.2/seamonkey && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
add-plugins.sh.in | 0000001450 1.42 KB | |
compare-locales.tar.bz2 | 0000029911 29.2 KB | |
create-tar.sh | 0000001492 1.46 KB | |
find-external-requires.sh | 0000000275 275 Bytes | |
l10n-2.15.tar.bz2 | 0020417353 19.5 MB | |
mozilla-gstreamer-760140.patch | 0000018299 17.9 KB | |
mozilla-gstreamer-803287.patch | 0000008769 8.56 KB | |
mozilla-language.patch | 0000001744 1.7 KB | |
mozilla-libproxy-compat.patch | 0000001184 1.16 KB | |
mozilla-nongnome-proxies.patch | 0000001949 1.9 KB | |
mozilla-ntlm-full-path.patch | 0000000897 897 Bytes | |
mozilla-ppc.patch | 0000004505 4.4 KB | |
mozilla-prefer_plugin_pref.patch | 0000001977 1.93 KB | |
mozilla-shared-nss-db.patch | 0000004938 4.82 KB | |
mozilla-sle11.patch | 0000002689 2.63 KB | |
mozilla-ua-locale.patch | 0000001128 1.1 KB | |
mozilla-webrtc.patch | 0000002932 2.86 KB | |
mozilla.sh.in | 0000004273 4.17 KB | |
seamonkey-2.15-source.tar.bz2 | 0121437449 116 MB | |
seamonkey-desktop.tar.bz2 | 0000022975 22.4 KB | |
seamonkey-rpmlintrc | 0000000029 29 Bytes | |
seamonkey-shared-nss-db.patch | 0000001292 1.26 KB | |
seamonkey-ua-locale.patch | 0000000575 575 Bytes | |
seamonkey.changes | 0000097095 94.8 KB | |
seamonkey.spec | 0000013783 13.5 KB | |
search-addons.tar.bz2 | 0000002354 2.3 KB | |
suse-default-prefs.js | 0000000681 681 Bytes |
Latest Revision
- update to SeaMonkey 2.15 /(bnc#796895) * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770 Miscellaneous memory safety hazards * MFSA 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0767 CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829 Use-after-free and buffer overflow issues found using Address Sanitizer * MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow in Canvas * MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in addressbar during page loads * MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free when displaying table with many columns and column groups * MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are shared across iframes * MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to handling of SSL on threads * MFSA 2013-08/CVE-2013-0745 (bmo#794158) AutoWrapperChanger fails to keep objects alive during garbage collection * MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment mismatch with quickstubs returned values * MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event manipulation in plugin handler to bypass same-origin policy * MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space layout leaked in XBL objects * MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow in Javascript string concatenation * MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption in XBL with XML bindings containing SVG * MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object Wrapper (COW) bypass through changing prototype
Comments 0