This is the macosx_java_10_6_update13.nasl nessus plugin source code. Risk InformationĬVSS V2 Vector : AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C CVSS Base Score:
For more information, see how to use exploits safely. These exploits and PoCs could contain malware. WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. In any other case, this would be considered as an illegal activity.
(Java Applet - Driver Manager Privileged 'toString()' Remote Code Execution (Metasploit))īefore running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. (Java Applet Driver Manager Privileged toString() Remote Code Execution) Metasploit: exploit/multi/browser/java_jre17_driver_manager.
Here's the list of publicly known exploits and PoCs for verifying the Mac OS X : Java for Mac OS X 10.6 Update 13 vulnerability:
Upgrade to Java for Mac OS X 10.6 Update 13, which includes version 13.9.2 of the JavaVM Framework.Įxploit Available: True (Metasploit Framework, Exploit-DB, GitHub, Core Impact) It is, therefore, affected by several security vulnerabilities, the most serious of which may allow an untrusted Java applet to execute arbitrary code with the privileges of the current user outside the Java sandbox. The remote Mac OS X host has a version of Java for Mac OS X 10.6 that is missing Update 13, which updates the Java version to 1.6.0_41. The remote host has a version of Java that is affected by multiple vulnerabilities. Plugin Family: MacOS X Local Security Checks Name: Mac OS X : Java for Mac OS X 10.6 Update 13