This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote Windows host contains a runtime environment that is
affected by multiple vulnerabilities.
The remote host is using a vulnerable version of Sun Java Runtime
Plug-in, an web browser addon used to display Java applets.
It has been reported that the JRE Plug-in Security can be bypassed.
A remote attacker could exploit this by tricking a user into viewing
a maliciously crafted web page.
Additionally, a denial of service vulnerability is present in this
version of the JVM. This issue is triggered by viewing an applet
that misuses the serialization API.
See also :
Upgrade to JRE 1.4.2_08 / 1.5.0 update 2 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false