Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 8.9
https://security-tracker.debian.org/tracker/CVE-2004-0427
https://security-tracker.debian.org/tracker/CVE-2005-0489
https://security-tracker.debian.org/tracker/CVE-2004-0394
https://security-tracker.debian.org/tracker/CVE-2004-0447
https://security-tracker.debian.org/tracker/CVE-2004-0554
https://security-tracker.debian.org/tracker/CVE-2004-0565
https://security-tracker.debian.org/tracker/CVE-2004-0685
https://security-tracker.debian.org/tracker/CVE-2005-0001
https://security-tracker.debian.org/tracker/CVE-2004-0883
https://security-tracker.debian.org/tracker/CVE-2004-0949
https://security-tracker.debian.org/tracker/CVE-2004-1016
https://security-tracker.debian.org/tracker/CVE-2004-1333
https://security-tracker.debian.org/tracker/CVE-2004-0997
https://security-tracker.debian.org/tracker/CVE-2004-1335
https://security-tracker.debian.org/tracker/CVE-2004-1017
https://security-tracker.debian.org/tracker/CVE-2005-0124
https://security-tracker.debian.org/tracker/CVE-2003-0984
https://security-tracker.debian.org/tracker/CVE-2004-1070
https://security-tracker.debian.org/tracker/CVE-2004-1071
https://security-tracker.debian.org/tracker/CVE-2004-1072
https://security-tracker.debian.org/tracker/CVE-2004-1073
https://security-tracker.debian.org/tracker/CVE-2004-1074
https://security-tracker.debian.org/tracker/CVE-2004-0138
https://security-tracker.debian.org/tracker/CVE-2004-1068
https://security-tracker.debian.org/tracker/CVE-2004-1234
https://security-tracker.debian.org/tracker/CVE-2005-0003
https://security-tracker.debian.org/tracker/CVE-2004-1235
https://security-tracker.debian.org/tracker/CVE-2005-0504
https://security-tracker.debian.org/tracker/CVE-2005-0384
Severity: Critical
ID: 22609
File Name: debian_DSA-1067.nasl
Version: 1.19
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 10/14/2006
Updated: 1/4/2021
Dependencies: ssh_get_info.nasl
Risk Factor: Critical
VPR Score: 8.9
Base Score: 10
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:debian:debian_linux:kernel-image-2.4.16-lart, p-cpe:/a:debian:debian_linux:kernel-image-2.4.16-netwinder, p-cpe:/a:debian:debian_linux:kernel-image-2.4.16-riscpc, p-cpe:/a:debian:debian_linux:kernel-source-2.4.16, cpe:/o:debian:debian_linux:3.0
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/20/2006
Vulnerability Publication Date: 1/5/2004
CVE: CVE-2003-0984, CVE-2004-0138, CVE-2004-0394, CVE-2004-0427, CVE-2004-0447, CVE-2004-0554, CVE-2004-0565, CVE-2004-0685, CVE-2004-0883, CVE-2004-0949, CVE-2004-0997, CVE-2004-1016, CVE-2004-1017, CVE-2004-1068, CVE-2004-1070, CVE-2004-1071, CVE-2004-1072, CVE-2004-1073, CVE-2004-1074, CVE-2004-1234, CVE-2004-1235, CVE-2004-1333, CVE-2004-1335, CVE-2005-0001, CVE-2005-0003, CVE-2005-0124, CVE-2005-0135, CVE-2005-0384, CVE-2005-0489, CVE-2005-0504
DSA: 1067
CWE: 119