https://access.redhat.com/security/cve/cve-2007-3089
https://access.redhat.com/security/cve/cve-2007-3656
https://access.redhat.com/security/cve/cve-2007-3734
https://access.redhat.com/security/cve/cve-2007-3735
https://access.redhat.com/security/cve/cve-2007-3736
https://access.redhat.com/security/cve/cve-2007-3737
Severity: High
ID: 25751
File Name: redhat-RHSA-2007-0722.nasl
Version: 1.33
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 7/23/2007
Updated: 1/14/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 6.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, cpe:/o:redhat:enterprise_linux:4.5, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, cpe:/o:redhat:enterprise_linux:2.1, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 7/18/2007
Vulnerability Publication Date: 6/6/2007
CVE: CVE-2007-3089, CVE-2007-3656, CVE-2007-3734, CVE-2007-3735, CVE-2007-3736, CVE-2007-3737, CVE-2007-3738
BID: 24946