Language:
https://access.redhat.com/security/cve/cve-2010-3170
https://access.redhat.com/security/cve/cve-2010-3173
https://access.redhat.com/security/cve/cve-2010-3176
https://access.redhat.com/security/cve/cve-2010-3177
https://access.redhat.com/security/cve/cve-2010-3180
Severity: High
ID: 50039
File Name: redhat-RHSA-2010-0781.nasl
Version: 1.27
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 10/20/2010
Updated: 1/14/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 9.3
Temporal Score: 6.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:redhat:enterprise_linux:seamonkey-js-debugger, p-cpe:/a:redhat:enterprise_linux:seamonkey, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr, p-cpe:/a:redhat:enterprise_linux:seamonkey-dom-inspector, p-cpe:/a:redhat:enterprise_linux:seamonkey-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-mail, p-cpe:/a:redhat:enterprise_linux:seamonkey-chat, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss-devel, p-cpe:/a:redhat:enterprise_linux:seamonkey-nspr-devel, cpe:/o:redhat:enterprise_linux:4.8, p-cpe:/a:redhat:enterprise_linux:seamonkey-nss
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 10/19/2010
Vulnerability Publication Date: 10/21/2010
CVE: CVE-2010-3170, CVE-2010-3173, CVE-2010-3176, CVE-2010-3177, CVE-2010-3180, CVE-2010-3182
BID: 44243, 44248, 44251, 44253
RHSA: 2010:0781