Language:
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.
VPR Score: 9.5
http://www.nessus.org/u?2cad0aed
https://access.redhat.com/errata/RHSA-2013:0752
https://access.redhat.com/security/cve/cve-2013-2419
https://access.redhat.com/security/cve/cve-2013-1537
https://access.redhat.com/security/cve/cve-2013-1518
https://access.redhat.com/security/cve/cve-2013-2415
https://access.redhat.com/security/cve/cve-2013-2417
https://access.redhat.com/security/cve/cve-2013-2430
https://access.redhat.com/security/cve/cve-2013-2431
https://access.redhat.com/security/cve/cve-2013-2436
https://access.redhat.com/security/cve/cve-2013-1488
https://access.redhat.com/security/cve/cve-2013-0401
https://access.redhat.com/security/cve/cve-2013-1569
https://access.redhat.com/security/cve/cve-2013-2383
https://access.redhat.com/security/cve/cve-2013-2384
https://access.redhat.com/security/cve/cve-2013-2421
https://access.redhat.com/security/cve/cve-2013-2420
https://access.redhat.com/security/cve/cve-2013-2423
https://access.redhat.com/security/cve/cve-2013-2422
https://access.redhat.com/security/cve/cve-2013-2424
https://access.redhat.com/security/cve/cve-2013-2426
https://access.redhat.com/security/cve/cve-2013-2429
Severity: Critical
ID: 66014
File Name: redhat-RHSA-2013-0752.nasl
Version: 1.27
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 4/18/2013
Updated: 1/14/2021
Dependencies: ssh_get_info.nasl
Risk Factor: Critical
VPR Score: 9.5
Base Score: 10
Temporal Score: 8.7
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal Vector: E:H/RL:OF/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-debuginfo, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-demo, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-devel, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-javadoc, p-cpe:/a:redhat:enterprise_linux:java-1.7.0-openjdk-src, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.9
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/17/2013
CANVAS (CANVAS)
Core Impact
Metasploit (Java Applet Reflection Type Confusion Remote Code Execution)
CVE: CVE-2013-0401, CVE-2013-1488, CVE-2013-1518, CVE-2013-1537, CVE-2013-1557, CVE-2013-1558, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2415, CVE-2013-2417, CVE-2013-2419, CVE-2013-2420, CVE-2013-2421, CVE-2013-2422, CVE-2013-2423, CVE-2013-2424, CVE-2013-2426, CVE-2013-2429, CVE-2013-2430, CVE-2013-2431, CVE-2013-2436
BID: 58504, 58507, 59131, 59141, 59153, 59159, 59162, 59165, 59166, 59167, 59170, 59179, 59184, 59187, 59190, 59194, 59206, 59212, 59213, 59219, 59228, 59243
RHSA: 2013:0752