Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67174
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2010:0338
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2010:0338.

The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and
the Sun Java 5 Software Development Kit.

The java-1.5.0-sun packages are vulnerable to a number of security flaws
and should no longer be used. (CVE-2009-3555, CVE-2010-0082, CVE-2010-0084,
CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0091,
CVE-2010-0092, CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837,
CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842,
CVE-2010-0843, CVE-2010-0844, CVE-2010-0845, CVE-2010-0846, CVE-2010-0847,
CVE-2010-0848, CVE-2010-0849)

The Sun Java SE Release family 5.0 reached its End of Service Life on
November 3, 2009. The RHSA-2009:1571 update provided the final publicly
available update of version 5.0 (Update 22). Users interested in continuing
to receive critical fixes for Sun Java SE 5.0 should contact Oracle:

http://www.sun.com/software/javaforbusiness/index.jsp

An alternative to Sun Java SE 5.0 is the Java 2 Technology Edition of the
IBM Developer Kit for Linux, which is available from the Extras and
Supplementary channels on the Red Hat Network.

Applications capable of using the Java 6 runtime can be migrated to Java 6
on: OpenJDK (java-1.6.0-openjdk), an open source JDK included in Red Hat
Enterprise Linux 5, since 5.3
the IBM JDK, java-1.6.0-ibm
or the Sun JDK,
java-1.6.0-sun.

This update removes the java-1.5.0-sun packages as they have reached their
End of Service Life.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2010-0338.html
http://www.redhat.com/security/updates/classification/#critical
http://www.oracle.com/technology/deploy/security/critical-patch-updates/javacpumar2010.html

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3555
1021653
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1
1021752
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1
1023148
http://securitytracker.com/id?1023148
1023163
http://www.securitytracker.com/id?1023163
1023204
http://www.securitytracker.com/id?1023204
1023205
http://www.securitytracker.com/id?1023205
1023206
http://www.securitytracker.com/id?1023206
1023207
http://www.securitytracker.com/id?1023207
1023208
http://www.securitytracker.com/id?1023208
1023209
http://www.securitytracker.com/id?1023209
1023210
http://www.securitytracker.com/id?1023210
1023211
http://www.securitytracker.com/id?1023211
1023212
http://www.securitytracker.com/id?1023212
1023213
http://www.securitytracker.com/id?1023213
1023214
http://www.securitytracker.com/id?1023214
1023215
http://www.securitytracker.com/id?1023215
1023216
http://www.securitytracker.com/id?1023216
1023217
http://www.securitytracker.com/id?1023217
1023218
http://www.securitytracker.com/id?1023218
1023219
http://www.securitytracker.com/id?1023219
1023224
http://www.securitytracker.com/id?1023224
1023243
http://www.securitytracker.com/id?1023243
1023270
http://www.securitytracker.com/id?1023270
1023271
http://www.securitytracker.com/id?1023271
1023272
http://www.securitytracker.com/id?1023272
1023273
http://www.securitytracker.com/id?1023273
1023274
http://www.securitytracker.com/id?1023274
1023275
http://www.securitytracker.com/id?1023275
1023411
http://www.securitytracker.com/id?1023411
1023426
http://www.securitytracker.com/id?1023426
1023427
http://www.securitytracker.com/id?1023427
1023428
http://www.securitytracker.com/id?1023428
1024789
http://www.securitytracker.com/id?1024789
20091109 Transport Layer Security Renegotiation Vulnerability
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml
20091111 Re: SSL/TLS MiTM PoC
http://seclists.org/fulldisclosure/2009/Nov/139
20091118 TLS / SSLv3 vulnerability explained (DRAFT)
http://www.securityfocus.com/archive/1/507952/100/0/threaded
20091124 rPSA-2009-0155-1 httpd mod_ssl
http://www.securityfocus.com/archive/1/508075/100/0/threaded
20091130 TLS / SSLv3 vulnerability explained (New ways to leverage the vulnerability)
http://www.securityfocus.com/archive/1/508130/100/0/threaded
20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console
http://www.securityfocus.com/archive/1/515055/100/0/threaded
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
http://www.securityfocus.com/archive/1/516397/100/0/threaded
20131121 ESA-2013-077: RSA Data Protection Manager Appliance Multiple Vulnerabilities
http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html
273029
http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1
273350
http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1
274990
http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1
36935
http://www.securityfocus.com/bid/36935
37291
http://secunia.com/advisories/37291
37292
http://secunia.com/advisories/37292
37320
http://secunia.com/advisories/37320
37383
http://secunia.com/advisories/37383
37399
http://secunia.com/advisories/37399
37453
http://secunia.com/advisories/37453
37501
http://secunia.com/advisories/37501
37504
http://secunia.com/advisories/37504
37604
http://secunia.com/advisories/37604
37640
http://secunia.com/advisories/37640
37656
http://secunia.com/advisories/37656
37675
http://secunia.com/advisories/37675
37859
http://secunia.com/advisories/37859
38003
http://secunia.com/advisories/38003
38020
http://secunia.com/advisories/38020
38056
http://secunia.com/advisories/38056
38241
http://secunia.com/advisories/38241
38484
http://secunia.com/advisories/38484
38687
http://secunia.com/advisories/38687
38781
http://secunia.com/advisories/38781
39127
http://secunia.com/advisories/39127
39136
http://secunia.com/advisories/39136
39242
http://secunia.com/advisories/39242
39243
http://secunia.com/advisories/39243
39278
http://secunia.com/advisories/39278
39292
http://secunia.com/advisories/39292
39317
http://secunia.com/advisories/39317
39461
http://secunia.com/advisories/39461
39500
http://secunia.com/advisories/39500
39628
http://secunia.com/advisories/39628
39632
http://secunia.com/advisories/39632
39713
http://secunia.com/advisories/39713
39819
http://secunia.com/advisories/39819
40070
http://secunia.com/advisories/40070
40545
http://secunia.com/advisories/40545
40747
http://secunia.com/advisories/40747
40866
http://secunia.com/advisories/40866
41480
http://secunia.com/advisories/41480
41490
http://secunia.com/advisories/41490
41818
http://secunia.com/advisories/41818
41967
http://secunia.com/advisories/41967
41972
http://secunia.com/advisories/41972
42377
http://secunia.com/advisories/42377
42379
http://secunia.com/advisories/42379
42467
http://secunia.com/advisories/42467
42724
http://secunia.com/advisories/42724
42733
http://secunia.com/advisories/42733
42808
http://secunia.com/advisories/42808
42811
http://secunia.com/advisories/42811
42816
http://secunia.com/advisories/42816
43308
http://secunia.com/advisories/43308
44183
http://secunia.com/advisories/44183
44954
http://secunia.com/advisories/44954
48577
http://secunia.com/advisories/48577
60521
http://osvdb.org/60521
60972
http://osvdb.org/60972
62210
http://osvdb.org/62210
65202
http://osvdb.org/65202
ADV-2009-3164
http://www.vupen.com/english/advisories/2009/3164
ADV-2009-3165
http://www.vupen.com/english/advisories/2009/3165
ADV-2009-3205
http://www.vupen.com/english/advisories/2009/3205
ADV-2009-3220
http://www.vupen.com/english/advisories/2009/3220
ADV-2009-3310
http://www.vupen.com/english/advisories/2009/3310
ADV-2009-3313
http://www.vupen.com/english/advisories/2009/3313
ADV-2009-3353
http://www.vupen.com/english/advisories/2009/3353
ADV-2009-3354
http://www.vupen.com/english/advisories/2009/3354
ADV-2009-3484
http://www.vupen.com/english/advisories/2009/3484
ADV-2009-3521
http://www.vupen.com/english/advisories/2009/3521
ADV-2009-3587
http://www.vupen.com/english/advisories/2009/3587
ADV-2010-0086
http://www.vupen.com/english/advisories/2010/0086
ADV-2010-0173
http://www.vupen.com/english/advisories/2010/0173
ADV-2010-0748
http://www.vupen.com/english/advisories/2010/0748
ADV-2010-0848
http://www.vupen.com/english/advisories/2010/0848
ADV-2010-0916
http://www.vupen.com/english/advisories/2010/0916
ADV-2010-0933
http://www.vupen.com/english/advisories/2010/0933
ADV-2010-0982
http://www.vupen.com/english/advisories/2010/0982
ADV-2010-0994
http://www.vupen.com/english/advisories/2010/0994
ADV-2010-1054
http://www.vupen.com/english/advisories/2010/1054
ADV-2010-1107
http://www.vupen.com/english/advisories/2010/1107
ADV-2010-1191
http://www.vupen.com/english/advisories/2010/1191
ADV-2010-1350
http://www.vupen.com/english/advisories/2010/1350
ADV-2010-1639
http://www.vupen.com/english/advisories/2010/1639
ADV-2010-1673
http://www.vupen.com/english/advisories/2010/1673
ADV-2010-1793
http://www.vupen.com/english/advisories/2010/1793
ADV-2010-2010
http://www.vupen.com/english/advisories/2010/2010
ADV-2010-2745
http://www.vupen.com/english/advisories/2010/2745
ADV-2010-3069
http://www.vupen.com/english/advisories/2010/3069
ADV-2010-3086
http://www.vupen.com/english/advisories/2010/3086
ADV-2010-3126
http://www.vupen.com/english/advisories/2010/3126
ADV-2011-0032
http://www.vupen.com/english/advisories/2011/0032
ADV-2011-0033
http://www.vupen.com/english/advisories/2011/0033
ADV-2011-0086
http://www.vupen.com/english/advisories/2011/0086
APPLE-SA-2010-01-19-1
http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html
APPLE-SA-2010-05-18-1
http://lists.apple.com/archives/security-announce/2010//May/msg00001.html
APPLE-SA-2010-05-18-2
http://lists.apple.com/archives/security-announce/2010//May/msg00002.html
DSA-1934
http://www.debian.org/security/2009/dsa-1934
DSA-2141
http://www.debian.org/security/2011/dsa-2141
DSA-3253
http://www.debian.org/security/2015/dsa-3253
FEDORA-2009-12229
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html
FEDORA-2009-12305
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html
FEDORA-2009-12604
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html
FEDORA-2009-12606
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html
FEDORA-2009-12750
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html
FEDORA-2009-12775
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html
FEDORA-2009-12782
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html
FEDORA-2009-12968
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html
FEDORA-2010-16240
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html
FEDORA-2010-16294
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html
FEDORA-2010-16312
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html
FEDORA-2010-5357
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html
FEDORA-2010-5942
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html
FEDORA-2010-6131
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html
GLSA-200912-01
http://security.gentoo.org/glsa/glsa-200912-01.xml
GLSA-201203-22
http://security.gentoo.org/glsa/glsa-201203-22.xml
GLSA-201406-32
http://security.gentoo.org/glsa/glsa-201406-32.xml
HPSBGN02562
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041
HPSBHF02706
http://marc.info/?l=bugtraq&m=132077688910227&w=2
HPSBHF03293
http://marc.info/?l=bugtraq&m=142660345230545&w=2
HPSBMA02534
http://marc.info/?l=bugtraq&m=127419602507642&w=2
HPSBMA02547
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
HPSBMA02568
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995
HPSBMU02759
http://www.securityfocus.com/archive/1/522176
HPSBMU02799
http://marc.info/?l=bugtraq&m=134254866602253&w=2
HPSBOV02683
http://marc.info/?l=bugtraq&m=130497311408250&w=2
HPSBOV02762
http://marc.info/?l=bugtraq&m=133469267822771&w=2
HPSBUX02482
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686
HPSBUX02498
http://marc.info/?l=bugtraq&m=126150535619567&w=2
HPSBUX02517
http://marc.info/?l=bugtraq&m=127128920008563&w=2
HPSBUX02524
http://marc.info/?l=bugtraq&m=127557596201693&w=2
IC67848
http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848
IC68054
http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054
IC68055
http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055
MDVSA-2010:076
http://www.mandriva.com/security/advisories?name=MDVSA-2010:076
MDVSA-2010:084
http://www.mandriva.com/security/advisories?name=MDVSA-2010:084
MDVSA-2010:089
http://www.mandriva.com/security/advisories?name=MDVSA-2010:089
MS10-049
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049
PM00675
http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only
PM12247
http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247
RHSA-2010:0119
http://www.redhat.com/support/errata/RHSA-2010-0119.html
RHSA-2010:0130
http://www.redhat.com/support/errata/RHSA-2010-0130.html
RHSA-2010:0155
http://www.redhat.com/support/errata/RHSA-2010-0155.html
RHSA-2010:0165
http://www.redhat.com/support/errata/RHSA-2010-0165.html
RHSA-2010:0167
http://www.redhat.com/support/errata/RHSA-2010-0167.html
RHSA-2010:0337
http://www.redhat.com/support/errata/RHSA-2010-0337.html
RHSA-2010:0338
http://www.redhat.com/support/errata/RHSA-2010-0338.html
RHSA-2010:0339
http://www.redhat.com/support/errata/RHSA-2010-0339.html
RHSA-2010:0768
http://www.redhat.com/support/errata/RHSA-2010-0768.html
RHSA-2010:0770
http://www.redhat.com/support/errata/RHSA-2010-0770.html
RHSA-2010:0786
http://www.redhat.com/support/errata/RHSA-2010-0786.html
RHSA-2010:0807
http://www.redhat.com/support/errata/RHSA-2010-0807.html
RHSA-2010:0865
http://www.redhat.com/support/errata/RHSA-2010-0865.html
RHSA-2010:0986
http://www.redhat.com/support/errata/RHSA-2010-0986.html
RHSA-2010:0987
http://www.redhat.com/support/errata/RHSA-2010-0987.html
RHSA-2011:0880
http://www.redhat.com/support/errata/RHSA-2011-0880.html
SSA:2009-320-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446
SSRT090180
SSRT090208
SSRT090249
SSRT090264
SSRT100058
SSRT100089
SSRT100179
SSRT100219
SSRT100613
SSRT100817
SSRT100825
SSRT101846
SUSE-SA:2009:057
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html
SUSE-SA:2010:061
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html
SUSE-SR:2010:008
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
SUSE-SR:2010:011
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
SUSE-SR:2010:012
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
SUSE-SR:2010:013
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
SUSE-SR:2010:019
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
SUSE-SR:2010:024
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
SUSE-SU-2011:0847
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html
TA10-222A
http://www.us-cert.gov/cas/techalerts/TA10-222A.html
TA10-287A
http://www.us-cert.gov/cas/techalerts/TA10-287A.html
USN-1010-1
http://www.ubuntu.com/usn/USN-1010-1
USN-923-1
http://ubuntu.com/usn/usn-923-1
USN-927-1
http://www.ubuntu.com/usn/USN-927-1
USN-927-4
http://www.ubuntu.com/usn/USN-927-4
USN-927-5
http://www.ubuntu.com/usn/USN-927-5
VU#120541
http://www.kb.cert.org/vuls/id/120541
[4.5] 010: SECURITY FIX: November 26, 2009
http://openbsd.org/errata45.html#010_openssl
[4.6] 004: SECURITY FIX: November 26, 2009
http://openbsd.org/errata46.html#004_openssl
[announce] 20091107 CVE-2009-3555 - apache/mod_ssl vulnerability and mitigation
http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2
[cryptography] 20091105 OpenSSL 0.9.8l released
http://marc.info/?l=cryptography&m=125752275331877&w=2
[gnutls-devel] 20091105 Re: TLS renegotiation MITM
http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html
[oss-security] 20091105 CVE-2009-3555 for TLS renegotiation MITM attacks
http://www.openwall.com/lists/oss-security/2009/11/05/3
[oss-security] 20091105 Re: CVE-2009-3555 for TLS renegotiation MITM attacks
http://www.openwall.com/lists/oss-security/2009/11/05/5
[oss-security] 20091107 Re: CVE-2009-3555 for TLS renegotiation MITM attacks
http://www.openwall.com/lists/oss-security/2009/11/06/3
[oss-security] 20091107 Re: [TLS] CVE-2009-3555 for TLS renegotiation MITM attacks
http://www.openwall.com/lists/oss-security/2009/11/07/3
[oss-security] 20091120 CVEs for nginx
http://www.openwall.com/lists/oss-security/2009/11/20/1
[oss-security] 20091123 Re: CVEs for nginx
http://www.openwall.com/lists/oss-security/2009/11/23/10
[tls] 20091104 MITM attack on delayed TLS-client auth through renegotiation
http://www.ietf.org/mail-archive/web/tls/current/msg03928.html
[tls] 20091104 TLS renegotiation issue
http://www.ietf.org/mail-archive/web/tls/current/msg03948.html
[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
[tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E
http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html
http://blogs.iss.net/archive/sslmitmiscsrf.html
http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during
http://clicky.me/tlsvuln
http://extendedsubset.com/?p=8
http://extendedsubset.com/Renegotiating_TLS.pdf
http://kbase.redhat.com/faq/docs/DOC-20491
http://support.apple.com/kb/HT4004
http://support.apple.com/kb/HT4170
http://support.apple.com/kb/HT4171
http://support.avaya.com/css/P8/documents/100070150
http://support.avaya.com/css/P8/documents/100081611
http://support.avaya.com/css/P8/documents/100114315
http://support.avaya.com/css/P8/documents/100114327
http://support.citrix.com/article/CTX123359
http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES
http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released
http://sysoev.ru/nginx/patch.cve-2009-3555.txt
http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html
http://wiki.rpath.com/Advisories:rPSA-2009-0155
http://www-01.ibm.com/support/docview.wss?uid=swg21426108
http://www-01.ibm.com/support/docview.wss?uid=swg21432298
http://www-01.ibm.com/support/docview.wss?uid=swg24006386
http://www-01.ibm.com/support/docview.wss?uid=swg24025312
http://www.arubanetworks.com/support/alerts/aid-020810.txt
http://www.betanews.com/article/1257452450
http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html
http://www.ingate.com/Relnote.php?ver=481
http://www.links.org/?p=780
http://www.links.org/?p=786
http://www.links.org/?p=789
http://www.mozilla.org/security/announce/2010/mfsa2010-22.html
http://www.openoffice.org/security/cves/CVE-2009-3555.html
http://www.openssl.org/news/secadv_20091111.txt
http://www.opera.com/docs/changelogs/unix/1060/
http://www.opera.com/support/search/view/944/
http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html
http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c
http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html
http://www.tombom.co.uk/blog/?p=85
http://www.vmware.com/security/advisories/VMSA-2010-0019.html
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html
https://bugzilla.mozilla.org/show_bug.cgi?id=526689
https://bugzilla.mozilla.org/show_bug.cgi?id=545755
https://bugzilla.redhat.com/show_bug.cgi?id=533125
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://kb.bluecoat.com/index?page=content&id=SA50
https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html
https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
openSUSE-SU-2011:0845
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html
oval:org.mitre.oval:def:10088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10088
oval:org.mitre.oval:def:11578
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11578
oval:org.mitre.oval:def:11617
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11617
oval:org.mitre.oval:def:7315
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7315
oval:org.mitre.oval:def:7478
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7478
oval:org.mitre.oval:def:7973
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7973
oval:org.mitre.oval:def:8366
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8366
oval:org.mitre.oval:def:8535
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8535
tls-renegotiation-weak-security(54158)
https://exchange.xforce.ibmcloud.com/vulnerabilities/54158
Common Vulnerability Exposure (CVE) ID: CVE-2010-0082
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
HPdes Security Advisory: HPSBMA02547
HPdes Security Advisory: HPSBMU02799
HPdes Security Advisory: HPSBUX02524
HPdes Security Advisory: SSRT100089
HPdes Security Advisory: SSRT100179
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11576
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13934
SuSE Security Announcement: SUSE-SR:2010:008 (Google Search)
SuSE Security Announcement: SUSE-SR:2010:011 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-0084
http://osvdb.org/63482
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11120
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14061
http://www.redhat.com/support/errata/RHSA-2010-0383.html
http://www.redhat.com/support/errata/RHSA-2010-0471.html
http://secunia.com/advisories/39659
SuSE Security Announcement: SUSE-SR:2010:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://www.vupen.com/english/advisories/2010/1454
Common Vulnerability Exposure (CVE) ID: CVE-2010-0085
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10474
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13803
Common Vulnerability Exposure (CVE) ID: CVE-2010-0087
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13959
Common Vulnerability Exposure (CVE) ID: CVE-2010-0088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11173
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14321
Common Vulnerability Exposure (CVE) ID: CVE-2010-0089
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14208
Common Vulnerability Exposure (CVE) ID: CVE-2010-0091
http://osvdb.org/63481
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13492
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9855
Common Vulnerability Exposure (CVE) ID: CVE-2010-0092
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10057
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14210
Common Vulnerability Exposure (CVE) ID: CVE-2010-0093
http://osvdb.org/63485
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14288
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9877
Common Vulnerability Exposure (CVE) ID: CVE-2010-0094
Bugtraq: 20100405 ZDI-10-051: Sun Java Runtime RMIConnectionImpl Privileged Context Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510527/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-051
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10851
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14351
Common Vulnerability Exposure (CVE) ID: CVE-2010-0095
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11621
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14105
Common Vulnerability Exposure (CVE) ID: CVE-2010-0837
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10680
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14276
Common Vulnerability Exposure (CVE) ID: CVE-2010-0838
BugTraq ID: 39069
http://www.securityfocus.com/bid/39069
Bugtraq: 20100405 ZDI-10-061: Sun Java Runtime CMM readMabCurveData Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510534/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-061
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10482
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13923
XForce ISS Database: javase-javab-java2d-unspecifed(57346)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57346
Common Vulnerability Exposure (CVE) ID: CVE-2010-0839
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13357
Common Vulnerability Exposure (CVE) ID: CVE-2010-0840
BugTraq ID: 39065
http://www.securityfocus.com/bid/39065
Bugtraq: 20100405 ZDI-10-056: Sun Java Runtime Environment Trusted Methods Chaining Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510528/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-056
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13971
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9974
http://www.redhat.com/support/errata/RHSA-2010-0489.html
http://secunia.com/advisories/40211
http://www.vupen.com/english/advisories/2010/1523
Common Vulnerability Exposure (CVE) ID: CVE-2010-0841
BugTraq ID: 39067
http://www.securityfocus.com/bid/39067
Bugtraq: 20100405 ZDI-10-054: Sun Java Runtime Environment JPEGImageReader stepX Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510531/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-054/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14144
Common Vulnerability Exposure (CVE) ID: CVE-2010-0842
BugTraq ID: 39077
http://www.securityfocus.com/bid/39077
Bugtraq: 20100405 ZDI-10-060: Sun Java Runtime Environment MixerSequencer Invalid Array Index Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510532/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-060
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14101
Common Vulnerability Exposure (CVE) ID: CVE-2010-0843
BugTraq ID: 39083
http://www.securityfocus.com/bid/39083
Bugtraq: 20100405 ZDI-10-052: Sun Java Runtime Environment XNewPtr Remote Code Execution Vulnerability (Google Search)
http://seclists.org/bugtraq/2010/Apr/41
http://www.zerodayinitiative.com/advisories/ZDI-10-052/
http://osvdb.org/63492
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14092
Common Vulnerability Exposure (CVE) ID: CVE-2010-0844
Bugtraq: 20100405 ZDI-10-053: Sun Java Runtime Environment MIDI File metaEvent Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510529/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-053
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14282
Common Vulnerability Exposure (CVE) ID: CVE-2010-0845
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14521
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9896
Common Vulnerability Exposure (CVE) ID: CVE-2010-0846
BugTraq ID: 39062
http://www.securityfocus.com/bid/39062
Bugtraq: 20100405 ZDI-10-059: Sun Java Runtime Environment JPEGImageEncoderImpl Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510541/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-059
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14503
Common Vulnerability Exposure (CVE) ID: CVE-2010-0847
BugTraq ID: 39071
http://www.securityfocus.com/bid/39071
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=865
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10392
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14453
Common Vulnerability Exposure (CVE) ID: CVE-2010-0848
BugTraq ID: 39078
http://www.securityfocus.com/bid/39078
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14350
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9899
Common Vulnerability Exposure (CVE) ID: CVE-2010-0849
BugTraq ID: 39073
http://www.securityfocus.com/bid/39073
Bugtraq: 20100405 ZDI-10-057: Sun Java Runtime Environment JPEGImageDecoderImpl Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/510548/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-10-057/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13795
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.