This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Windows host has an application that is affected by
a security bypass vulnerability.
The remote host is using a vulnerable version of Sun Java Runtime
Plug-in, a web browser addon used to display Java applets. Two
security issues have been reported in the remote version of this
- An untrusted applet may escalate its privileges in
order to read, write or execute files on the remote system.
- An untrusted applet may interfere with trusted applets
loaded on the same page.
A remote attacker could exploit this by tricking a user into
visiting a maliciously crafted web page.
See also :
Upgrade to JDK 1.3.1_13 / JRE 1.4.2_06 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true