Language:
http://support.novell.com/security/cve/CVE-2009-3555.html
http://support.novell.com/security/cve/CVE-2010-1321.html
http://support.novell.com/security/cve/CVE-2010-3541.html
http://support.novell.com/security/cve/CVE-2010-3548.html
http://support.novell.com/security/cve/CVE-2010-3549.html
http://support.novell.com/security/cve/CVE-2010-3550.html
http://support.novell.com/security/cve/CVE-2010-3551.html
http://support.novell.com/security/cve/CVE-2010-3556.html
http://support.novell.com/security/cve/CVE-2010-3559.html
http://support.novell.com/security/cve/CVE-2010-3562.html
http://support.novell.com/security/cve/CVE-2010-3565.html
http://support.novell.com/security/cve/CVE-2010-3566.html
http://support.novell.com/security/cve/CVE-2010-3568.html
http://support.novell.com/security/cve/CVE-2010-3569.html
http://support.novell.com/security/cve/CVE-2010-3572.html
Severity: Critical
ID: 50854
File Name: suse9_12659.nasl
Version: 1.11
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 12/1/2010
Updated: 1/14/2021
Supported Sensors: Continuous Assessment, Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: Critical
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/o:suse:suse_linux
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/26/2010
CVE: CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3556, CVE-2010-3559, CVE-2010-3562, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574
CWE: 310