Oracle Java SE 6 < Update 113 / 7 < Update 97 / 8 < Update 73 Arbitrary Code Execution

high Nessus Network Monitor Plugin ID 9353
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is missing a critical Oracle Java SE patch update.


The Oracle Java SE installed on the remote host is version 6 prior to Update 113, 7 prior to Update 97, or 8 prior to Update 73 and is affected by an arbitrary code execution vulnerability that may have been exploited when installing Java. If an attacker convinced a user to download a set of malicious files before Java was installed, then arbitrary code may have been executed during the installation. A system with the vulnerable versions of Java installed should be checked for malicious software or abnormal behaviors.


Update to Java 1.6.0_113 (for JRE 6) / 1.7.0_97 (for JRE 7) / 1.8.0_73 (for JRE 8) or later.

See Also

Plugin Details

Severity: High

ID: 9353

Family: Web Clients

Published: 6/9/2016

Updated: 3/6/2019

Dependencies: 8893, 8892, 8895

Nessus ID: 88755

Risk Information


Risk Factor: High

Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Risk Factor: High

Base Score: 7.5

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:oracle:java_se:*:*:*:*:*:*:*:*

Patch Publication Date: 2/5/2016

Vulnerability Publication Date: 2/5/2016

Reference Information

CVE: CVE-2016-0603

BID: 83008