https://access.redhat.com/security/cve/cve-2006-2776
https://access.redhat.com/security/cve/cve-2006-2778
https://access.redhat.com/security/cve/cve-2006-2779
https://access.redhat.com/security/cve/cve-2006-2780
https://access.redhat.com/security/cve/cve-2006-2781
https://access.redhat.com/security/cve/cve-2006-2782
https://access.redhat.com/security/cve/cve-2006-2783
https://access.redhat.com/security/cve/cve-2006-2784
https://access.redhat.com/security/cve/cve-2006-2785
https://access.redhat.com/security/cve/cve-2006-2786
https://access.redhat.com/security/cve/cve-2006-2787
https://access.redhat.com/security/cve/cve-2006-2788
https://access.redhat.com/security/cve/cve-2006-3113
https://access.redhat.com/security/cve/cve-2006-3677
https://access.redhat.com/security/cve/cve-2006-3801
https://access.redhat.com/security/cve/cve-2006-3802
https://access.redhat.com/security/cve/cve-2006-3803
https://access.redhat.com/security/cve/cve-2006-3804
https://access.redhat.com/security/cve/cve-2006-3805
https://access.redhat.com/security/cve/cve-2006-3806
https://access.redhat.com/security/cve/cve-2006-3807
https://access.redhat.com/security/cve/cve-2006-3808
https://access.redhat.com/security/cve/cve-2006-3809
https://access.redhat.com/security/cve/cve-2006-3810
https://access.redhat.com/security/cve/cve-2006-3811
Severity: High
ID: 22150
File Name: redhat-RHSA-2006-0609.nasl
Version: 1.32
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 8/4/2006
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:devhelp-devel, p-cpe:/a:redhat:enterprise_linux:devhelp, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/2/2006
Vulnerability Publication Date: 6/2/2006
Metasploit (Mozilla Suite/Firefox Navigator Object Code Execution)
CVE: CVE-2006-2776, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812