https://access.redhat.com/security/cve/cve-2006-2779
https://access.redhat.com/security/cve/cve-2006-2780
https://access.redhat.com/security/cve/cve-2006-2781
https://access.redhat.com/security/cve/cve-2006-2782
https://access.redhat.com/security/cve/cve-2006-2783
https://access.redhat.com/security/cve/cve-2006-2784
https://access.redhat.com/security/cve/cve-2006-2785
https://access.redhat.com/security/cve/cve-2006-2786
https://access.redhat.com/security/cve/cve-2006-2787
https://access.redhat.com/security/cve/cve-2006-2788
https://access.redhat.com/security/cve/cve-2006-3113
https://access.redhat.com/security/cve/cve-2006-3677
https://access.redhat.com/security/cve/cve-2006-3801
https://access.redhat.com/security/cve/cve-2006-3802
https://access.redhat.com/security/cve/cve-2006-3803
https://access.redhat.com/security/cve/cve-2006-3804
https://access.redhat.com/security/cve/cve-2006-3805
https://access.redhat.com/security/cve/cve-2006-3806
https://access.redhat.com/security/cve/cve-2006-3807
https://access.redhat.com/security/cve/cve-2006-3808
https://access.redhat.com/security/cve/cve-2006-3809
https://access.redhat.com/security/cve/cve-2006-3810
https://access.redhat.com/security/cve/cve-2006-3811
https://access.redhat.com/security/cve/cve-2006-3812
https://access.redhat.com/errata/RHSA-2006:0594
Severity: High
ID: 22291
File Name: redhat-RHSA-2006-0594.nasl
Version: 1.31
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 8/30/2006
Updated: 1/14/2021
Supported Sensors: Frictionless Assessment Azure, Nessus Agent, Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, cpe:/o:redhat:enterprise_linux:2.1, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/28/2006
Vulnerability Publication Date: 6/2/2006
Metasploit (Mozilla Suite/Firefox Navigator Object Code Execution)
CVE: CVE-2006-2776, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3804, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812