http://www.nessus.org/u?46fc1784
Severity: High
ID: 22162
File Name: centos_RHSA-2006-0608.nasl
Version: 1.22
Type: local
Agent: unix
Family: CentOS Local Security Checks
Published: 8/7/2006
Updated: 1/4/2021
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: p-cpe:/a:centos:centos:seamonkey, p-cpe:/a:centos:centos:seamonkey-chat, p-cpe:/a:centos:centos:seamonkey-devel, p-cpe:/a:centos:centos:seamonkey-dom-inspector, p-cpe:/a:centos:centos:seamonkey-js-debugger, p-cpe:/a:centos:centos:seamonkey-mail, p-cpe:/a:centos:centos:seamonkey-nspr, p-cpe:/a:centos:centos:seamonkey-nspr-devel, p-cpe:/a:centos:centos:seamonkey-nss, p-cpe:/a:centos:centos:seamonkey-nss-devel, cpe:/o:centos:centos:3
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/5/2006
Vulnerability Publication Date: 7/27/2006
Metasploit (Mozilla Suite/Firefox Navigator Object Code Execution)
CVE: CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812
RHSA: 2006:0608