http://www.nessus.org/u?328dac8f
Severity: High
ID: 22163
File Name: centos_RHSA-2006-0609.nasl
Version: 1.24
Type: local
Agent: unix
Family: CentOS Local Security Checks
Published: 8/7/2006
Updated: 1/4/2021
Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:centos:centos:devhelp, p-cpe:/a:centos:centos:devhelp-devel, p-cpe:/a:centos:centos:seamonkey, p-cpe:/a:centos:centos:seamonkey-chat, p-cpe:/a:centos:centos:seamonkey-devel, p-cpe:/a:centos:centos:seamonkey-dom-inspector, p-cpe:/a:centos:centos:seamonkey-js-debugger, p-cpe:/a:centos:centos:seamonkey-mail, p-cpe:/a:centos:centos:seamonkey-nspr, p-cpe:/a:centos:centos:seamonkey-nspr-devel, p-cpe:/a:centos:centos:seamonkey-nss, p-cpe:/a:centos:centos:seamonkey-nss-devel, cpe:/o:centos:centos:4
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/5/2006
Vulnerability Publication Date: 6/2/2006
Metasploit (Mozilla Suite/Firefox Navigator Object Code Execution)
CVE: CVE-2006-2776, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812