Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 9
https://access.redhat.com/security/cve/cve-2009-3555
https://access.redhat.com/security/cve/cve-2010-1321
https://access.redhat.com/security/cve/cve-2010-3541
https://access.redhat.com/security/cve/cve-2010-3548
https://access.redhat.com/security/cve/cve-2010-3549
https://access.redhat.com/security/cve/cve-2010-3550
https://access.redhat.com/security/cve/cve-2010-3551
https://access.redhat.com/security/cve/cve-2010-3553
https://access.redhat.com/security/cve/cve-2010-3555
https://access.redhat.com/security/cve/cve-2010-3556
https://access.redhat.com/security/cve/cve-2010-3557
https://access.redhat.com/security/cve/cve-2010-3558
https://access.redhat.com/security/cve/cve-2010-3560
https://access.redhat.com/security/cve/cve-2010-3562
https://access.redhat.com/security/cve/cve-2010-3563
https://access.redhat.com/security/cve/cve-2010-3565
https://access.redhat.com/security/cve/cve-2010-3566
https://access.redhat.com/security/cve/cve-2010-3568
https://access.redhat.com/security/cve/cve-2010-3569
https://access.redhat.com/security/cve/cve-2010-3571
https://access.redhat.com/security/cve/cve-2010-3572
https://access.redhat.com/security/cve/cve-2010-3573
https://access.redhat.com/security/cve/cve-2010-3574
https://developer.ibm.com/javasdk/support/security-vulnerabilities/
Severity: Critical
ID: 51197
File Name: redhat-RHSA-2010-0987.nasl
Version: 1.29
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 12/16/2010
Updated: 1/14/2021
Risk Factor: Critical
VPR Score: 9
Base Score: 10
Temporal Score: 7.8
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: E:POC/RL:OF/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-accessibility, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-demo, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-devel, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-javacomm, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-jdbc, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-plugin, p-cpe:/a:redhat:enterprise_linux:java-1.6.0-ibm-src, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.0
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/15/2010
Vulnerability Publication Date: 11/9/2009
CANVAS (D2ExploitPack)
Metasploit (Sun Java Web Start BasicServiceImpl Code Execution)
CVE: CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574
BID: 36935, 40235, 43965, 43971, 43979, 43985, 43988, 43999, 44009, 44011, 44012, 44014, 44016, 44017, 44021, 44024, 44027, 44028, 44030, 44032, 44035, 44038, 44040