Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 9.3
https://access.redhat.com/security/cve/cve-2009-0217
https://access.redhat.com/security/cve/cve-2009-1093
https://access.redhat.com/security/cve/cve-2009-1094
https://access.redhat.com/security/cve/cve-2009-1095
https://access.redhat.com/security/cve/cve-2009-1096
https://access.redhat.com/security/cve/cve-2009-1097
https://access.redhat.com/security/cve/cve-2009-1098
https://access.redhat.com/security/cve/cve-2009-1099
https://access.redhat.com/security/cve/cve-2009-1100
https://access.redhat.com/security/cve/cve-2009-1101
https://access.redhat.com/security/cve/cve-2009-1103
https://access.redhat.com/security/cve/cve-2009-1104
https://access.redhat.com/security/cve/cve-2009-1105
https://access.redhat.com/security/cve/cve-2009-1106
https://access.redhat.com/security/cve/cve-2009-1107
https://access.redhat.com/security/cve/cve-2009-2625
https://access.redhat.com/security/cve/cve-2009-2670
https://access.redhat.com/security/cve/cve-2009-2671
https://access.redhat.com/security/cve/cve-2009-2672
https://access.redhat.com/security/cve/cve-2009-2673
https://access.redhat.com/security/cve/cve-2009-2674
https://access.redhat.com/security/cve/cve-2009-2675
https://access.redhat.com/security/cve/cve-2009-2676
https://access.redhat.com/security/cve/cve-2009-3865
https://access.redhat.com/security/cve/cve-2009-3866
https://access.redhat.com/security/cve/cve-2009-3867
https://access.redhat.com/security/cve/cve-2009-3868
https://access.redhat.com/security/cve/cve-2009-3869
https://access.redhat.com/security/cve/cve-2009-3871
https://access.redhat.com/security/cve/cve-2009-3872
https://access.redhat.com/security/cve/cve-2009-3873
https://access.redhat.com/security/cve/cve-2009-3874
https://access.redhat.com/security/cve/cve-2009-3875
https://access.redhat.com/security/cve/cve-2009-3876
Severity: Critical
ID: 44029
File Name: redhat-RHSA-2010-0043.nasl
Version: 1.36
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 1/15/2010
Updated: 1/14/2021
Dependencies: ssh_get_info.nasl
Risk Factor: Critical
VPR Score: 9.3
Base Score: 10
Temporal Score: 8.7
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: E:H/RL:OF/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:5
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/14/2010
Vulnerability Publication Date: 3/25/2009
CANVAS (CANVAS)
Core Impact
Metasploit (Sun Java JRE AWT setDiffICM Buffer Overflow)
CVE: CVE-2009-0217, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-3403, CVE-2009-3865, CVE-2009-3866, CVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872, CVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877, CVE-2010-0079
BID: 34240, 35671, 35939, 35942, 35943, 35944, 35946, 35958, 36881