Language:
http://support.novell.com/security/cve/CVE-2013-0419.html
http://support.novell.com/security/cve/CVE-2013-0422.html
http://support.novell.com/security/cve/CVE-2013-0423.html
http://support.novell.com/security/cve/CVE-2013-0424.html
http://support.novell.com/security/cve/CVE-2013-0425.html
http://support.novell.com/security/cve/CVE-2013-0426.html
http://support.novell.com/security/cve/CVE-2013-0427.html
http://support.novell.com/security/cve/CVE-2013-0428.html
http://support.novell.com/security/cve/CVE-2013-0431.html
http://support.novell.com/security/cve/CVE-2013-0432.html
http://support.novell.com/security/cve/CVE-2013-0433.html
http://support.novell.com/security/cve/CVE-2013-0434.html
http://support.novell.com/security/cve/CVE-2013-0435.html
http://support.novell.com/security/cve/CVE-2013-0437.html
http://support.novell.com/security/cve/CVE-2013-0438.html
http://support.novell.com/security/cve/CVE-2013-0440.html
http://support.novell.com/security/cve/CVE-2013-0441.html
http://support.novell.com/security/cve/CVE-2013-0442.html
http://support.novell.com/security/cve/CVE-2013-0443.html
http://support.novell.com/security/cve/CVE-2013-0444.html
http://support.novell.com/security/cve/CVE-2013-0445.html
http://support.novell.com/security/cve/CVE-2013-0446.html
http://support.novell.com/security/cve/CVE-2013-0449.html
http://support.novell.com/security/cve/CVE-2013-0450.html
http://support.novell.com/security/cve/CVE-2013-1473.html
http://support.novell.com/security/cve/CVE-2013-1476.html
http://support.novell.com/security/cve/CVE-2013-1478.html
http://support.novell.com/security/cve/CVE-2013-1480.html
http://support.novell.com/security/cve/CVE-2013-1484.html
http://support.novell.com/security/cve/CVE-2013-1485.html
http://support.novell.com/security/cve/CVE-2013-1486.html
http://support.novell.com/security/cve/CVE-2013-1487.html
https://bugzilla.novell.com/show_bug.cgi?id=798535
http://support.novell.com/security/cve/CVE-2012-1541.html
http://support.novell.com/security/cve/CVE-2012-3174.html
http://support.novell.com/security/cve/CVE-2012-3213.html
http://support.novell.com/security/cve/CVE-2012-3342.html
Severity: Critical
ID: 65246
File Name: suse_11_java-1_7_0-ibm-130306.nasl
Version: 1.10
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/13/2013
Updated: 5/25/2022
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm-jdbc, p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm-plugin, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm-alsa, p-cpe:/a:novell:suse_linux:11:java-1_7_0-ibm
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/6/2013
CISA Known Exploited Vulnerability Due Dates: 6/15/2022
CANVAS (CANVAS)
Core Impact
Metasploit (Java Applet JMX Remote Code Execution)
CVE: CVE-2012-1541, CVE-2012-3174, CVE-2012-3213, CVE-2012-3342, CVE-2013-0351, CVE-2013-0409, CVE-2013-0419, CVE-2013-0422, CVE-2013-0423, CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428, CVE-2013-0431, CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0437, CVE-2013-0438, CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0444, CVE-2013-0445, CVE-2013-0446, CVE-2013-0449, CVE-2013-0450, CVE-2013-1473, CVE-2013-1476, CVE-2013-1478, CVE-2013-1480, CVE-2013-1484, CVE-2013-1485, CVE-2013-1486, CVE-2013-1487