Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0578

The remote host is missing updates announced in
advisory RHSA-2006:0578.

SeaMonkey is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

The Mozilla Foundation has discontinued support for the Mozilla Suite. This
update deprecates the Mozilla Suite in Red Hat Enterprise Linux 3 in favor
of the supported SeaMonkey Suite.

This update also resolves a number of outstanding Mozilla security issues.
Please visit the referenced security advisories for details.

Users of Mozilla are advised to upgrade to this update, which contains
SeaMonkey version 1.0.2 that is not vulnerable to these issues.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Critical

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-2779
BugTraq ID: 18228
Bugtraq: 20060602 rPSA-2006-0091-1 firefox thunderbird (Google Search)
Cert/CC Advisory: TA06-153A
CERT/CC vulnerability note: VU#466673
Debian Security Information: DSA-1118 (Google Search)
Debian Security Information: DSA-1120 (Google Search)
Debian Security Information: DSA-1134 (Google Search)
Debian Security Information: DSA-1159 (Google Search)
Debian Security Information: DSA-1160 (Google Search)
HPdes Security Advisory: HPSBUX02153
HPdes Security Advisory: HPSBUX02156
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: SSRT061236
RedHat Security Advisories: RHSA-2006:0609
SuSE Security Announcement: SUSE-SA:2006:035 (Google Search)
XForce ISS Database: mozilla-browserengine-memory-corruption(26843)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2780
Common Vulnerability Exposure (CVE) ID: CVE-2006-2781
XForce ISS Database: mozilla-vcard-doublefree-memory-corruption(26850)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2783
XForce ISS Database: mozilla-bom-utf8-xss(26852)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2782
XForce ISS Database: mozilla-firefox-textbox-file-access(26851)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2778
CERT/CC vulnerability note: VU#421529
XForce ISS Database: mozilla-crypto-signtext-bo(26849)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2776
CERT/CC vulnerability note: VU#575969
XForce ISS Database: mozilla-contentdefined-code-execution(26848)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2784
XForce ISS Database: mozilla-pluginspage-code-execution(26847)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2785
XForce ISS Database: mozilla-viewimage-xss(26845)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2786
XForce ISS Database: mozilla-http-response-smuggling(26844)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2787
XForce ISS Database: mozilla-valueof-sandbox-bypass(26842)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2788
Debian Security Information: DSA-1191 (Google Search)
Debian Security Information: DSA-1192 (Google Search)
Debian Security Information: DSA-1210 (Google Search)
CopyrightCopyright (c) 2006 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.