Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
51192 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
15463 |
89038 |
CVE-2010-4180 |
9.3 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0013) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
libraries :
- Apache Struts
- glibc
- GnuTLS
- JRE
- kernel
- libxml2
- OpenSSL
- Perl
- popt and rpm |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 /
4.1 / 5.0. |
http://www.vmware.com/security/advisories/VMSA-2012-0013.html |
ESX version : ESX 4.0 Installed build : 208167 Fixed build : 787047 |
|
51705 |
H28_MUN_DWEB_Q4_172_16_240_seg.csv |
15463 |
89681 |
CVE-2010-4180 |
10 |
Critical |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0013) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
components and libraries :
- Java Runtime Environment (JRE)
- libuser
- Netscape Portable Runtime (NSPR)
- Network Security Services (NSS)
- OpenSSL |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2011-0013
http://lists.vmware.com/pipermail/security-announce/2012/000169.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 660575 |
|
54594 |
tokyu_5_teiki_20170116.csv |
15463 |
51892 |
CVE-2010-4180 |
4.3 |
Medium |
175.177.161.13 |
tcp |
443 |
OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Downgrade Issue |
The remote host allows resuming SSL sessions with a weaker cipher
than the one originally negotiated. |
The version of OpenSSL on the remote host has been shown to allow
resuming session with a weaker cipher than was used when the session
was initiated. This means that an attacker that sees (i.e., by
sniffing) the start of an SSL connection can manipulate the OpenSSL
session cache to cause subsequent resumptions of that session to use a
weaker cipher chosen by the attacker.
Note that other SSL implementations may also be affected by this
vulnerability. |
Upgrade to OpenSSL 0.9.8q / 1.0.0.c or later, or contact your vendor for a patch. |
http://openssl.org/news/secadv_20101202.txt |
The server allowed the following session over TLSv1 to be resumed as follows : Session ID : bbd0385fe5179aceb4bf2b972a224fe44cc0968c23dfa8192921cdc0c599eca9 Initial Cipher : TLS1_CK_RSA_WITH_AES_256_CBC_SHA (0x0035) Resumed Cipher : TLS1_CK_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) |
|
55080 |
13_tokyu_bellselect_20170118.csv |
15463 |
51892 |
CVE-2010-4180 |
4.3 |
Medium |
218.45.196.196 |
tcp |
443 |
OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Downgrade Issue |
The remote host allows resuming SSL sessions with a weaker cipher
than the one originally negotiated. |
The version of OpenSSL on the remote host has been shown to allow
resuming session with a weaker cipher than was used when the session
was initiated. This means that an attacker that sees (i.e., by
sniffing) the start of an SSL connection can manipulate the OpenSSL
session cache to cause subsequent resumptions of that session to use a
weaker cipher chosen by the attacker.
Note that other SSL implementations may also be affected by this
vulnerability. |
Upgrade to OpenSSL 0.9.8q / 1.0.0.c or later, or contact your vendor for a patch. |
http://openssl.org/news/secadv_20101202.txt |
The server allowed the following session over TLSv1 to be resumed as follows : Session ID : fd8c21f98386d5cb66b2ff59f783cdd72a26823684dff761622d288c11d8520c Initial Cipher : TLS1_CK_RSA_WITH_RC4_128_SHA (0x0005) Resumed Cipher : TLS1_CK_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) |
|
56773 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
15463 |
89038 |
CVE-2010-4180 |
9.3 |
High |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0013) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
libraries :
- Apache Struts
- glibc
- GnuTLS
- JRE
- kernel
- libxml2
- OpenSSL
- Perl
- popt and rpm |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 /
4.1 / 5.0. |
http://www.vmware.com/security/advisories/VMSA-2012-0013.html |
ESX version : ESX 4.0 Installed build : 208167 Fixed build : 787047 |
|
57286 |
H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv |
15463 |
89681 |
CVE-2010-4180 |
10 |
Critical |
172.16.240.115 |
tcp |
443 |
VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2011-0013) (remote check) |
The remote VMware ESX / ESXi host is missing a security-related patch. |
The remote VMware ESX / ESXi host is missing a security-related patch.
It is, therefore, affected by multiple vulnerabilities, including
remote code execution vulnerabilities, in several third-party
components and libraries :
- Java Runtime Environment (JRE)
- libuser
- Netscape Portable Runtime (NSPR)
- Network Security Services (NSS)
- OpenSSL |
Apply the appropriate patch according to the vendor advisory that
pertains to ESX version 4.0 / 4.1 or ESXi version 4.0 / 4.1. |
https://www.vmware.com/security/advisories/VMSA-2011-0013
http://lists.vmware.com/pipermail/security-announce/2012/000169.html |
Version : ESX 4.0 Installed build : 208167 Fixed build : 660575 |
|