This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote Unix host contains a runtime environment that is affected by
The remote host is using an unmanaged version of Sun Java Runtime
Environment that has vulnerabilities in its Java Runtime Plug-in, a web
browser add-on used to display Java applets.
The JRE Plug-in security can be bypassed by tricking a user into viewing
a maliciously crafted web page.
Additionally, a denial of service vulnerability is present in this
version of the JVM. This issue is triggered by viewing an applet that
misuses the serialization API.
See also :
Upgrade to JRE 1.4.2_08 / 1.5.0 update 2 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Nessus Plugin ID: 64836 ()
Bugtraq ID: 1395813945
CVE ID: CVE-2005-1973CVE-2005-1974
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.