Language:
https://access.redhat.com/security/cve/cve-2009-1571
https://access.redhat.com/security/cve/cve-2010-0159
https://access.redhat.com/security/cve/cve-2010-0169
Severity: Critical
ID: 44652
File Name: redhat-RHSA-2010-0113.nasl
Version: 1.28
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 2/18/2010
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, cpe:/o:redhat:enterprise_linux:4.8, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 2/17/2010
Vulnerability Publication Date: 2/22/2010
CVE: CVE-2009-1571, CVE-2009-3988, CVE-2010-0159, CVE-2010-0160, CVE-2010-0162, CVE-2010-0169, CVE-2010-0171