{"id":19360,"date":"2023-04-20T15:53:43","date_gmt":"2023-04-20T19:53:43","guid":{"rendered":"https:\/\/kevinjustin.com\/blog\/?p=19360"},"modified":"2023-04-20T15:53:43","modified_gmt":"2023-04-20T19:53:43","slug":"acas-scan-for-java-vulns-plugin-ids-170161166316","status":"publish","type":"post","link":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/","title":{"rendered":"ACAS scan for Java vulns PlugIn ID&#8217;s 170161,166316"},"content":{"rendered":"<figure id=\"attachment_19361\" aria-describedby=\"caption-attachment-19361\" style=\"width: 672px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19361\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg\" alt=\"\" width=\"672\" height=\"372\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg 672w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1-300x166.jpg 300w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><figcaption id=\"caption-attachment-19361\" class=\"wp-caption-text\">Java vulnerabilities on your SCOM servers<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>If you&#8217;re responsible for security compliance with SCOM servers, there will be times when applications need to be upgraded.\u00a0 \u00a0Current effort is Java vulnerabilities on your SCOM servers, current examples are plugIn ID&#8217;s\u00a0 170161,166316.\u00a0 Compliance and Security are big deals, even in air-gapped networks.\u00a0 \u00a0Why &#8211; even if external hacking risk is low, the security tools will cause administrative headaches when scanning weekly or more often.\u00a0 The scans can also be intrusive in nature, causing even more problems.\u00a0 \u00a0For the Java vulnerabilities, when running some 3rd party tools, like Cisco UCS monitoring,\u00a0 Java is installed for the application to run.\u00a0 \u00a0Java is like OS updates, comes up with periodic vulnerabilities popping up on your favorite security scanner software\/tool (like Nessus\/ACAS\/Tenable+).<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Oracle Java vulnerability detail links\u00a0<a href=\"https:\/\/www.tenable.com\/plugins\/nessus\/170161\" target=\"_blank\" rel=\"noopener\">ID 170161<\/a>, <a href=\"https:\/\/www.tenable.com\/plugins\/nessus\/166316\" target=\"_blank\" rel=\"noopener\">ID 166316<\/a><\/p>\n<figure id=\"attachment_19362\" aria-describedby=\"caption-attachment-19362\" style=\"width: 559px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaACAS.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19362\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaACAS.png\" alt=\"ACAS Java vulnerabilities\" width=\"559\" height=\"41\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaACAS.png 559w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaACAS-300x22.png 300w\" sizes=\"auto, (max-width: 559px) 85vw, 559px\" \/><\/a><figcaption id=\"caption-attachment-19362\" class=\"wp-caption-text\">ACAS Java vulnerabilities<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>These specific vulnerabilities, the tool is looking for paths for Java 1.8.0+.\u00a0 \u00a0Even after upgrading Java, the vulnerabilities still showed, requesting debug output, it showed two paths on C: (64 and 32bit paths).<\/p>\n<p>&nbsp;<\/p>\n<p>Plugin Output:<\/p>\n<p>Path\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : C:\\Program Files (x86)\\Java\\jre1.8.0_341\\<\/p>\n<p>Installed version : 1.8.0_341 \/ build 8.0.341<\/p>\n<p>Fixed version\u00a0\u00a0\u00a0\u00a0 : Upgrade to version 8.0.361 or greater<\/p>\n<p>&nbsp;<\/p>\n<p>Path\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : C:\\Program Files\\Java\\jre1.8.0_341\\<\/p>\n<p>Installed version : 1.8.0_341 \/ build 8.0.341<\/p>\n<p>Fixed version\u00a0\u00a0\u00a0\u00a0 : Upgrade to version 8.0.361 or greater<\/p>\n<p>&nbsp;<\/p>\n<p>In my case, the upgrade completed, but did not remove the old version 1.8.0_341 (vulnerable version)!<\/p>\n<p>&nbsp;<\/p>\n<p>PS C:\\Program Files\\java&gt; gci<\/p>\n<p>Directory: C:\\Program Files\\java<\/p>\n<p>Mode\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 LastWriteTime\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Length Name<\/p>\n<p>&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212; &#8212;-<\/p>\n<p>da&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 7\/28\/2022\u00a0\u00a0 6:27 AM\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 jre1.8.0_341<\/p>\n<p>da&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 3\/15\/2023\u00a0\u00a0 6:12 PM\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 jre1.8.0_361<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Verify Java version on affected server(s)<\/strong><\/h2>\n<p>Verify install &#8211; whether you check from Windows Explorer for the C: drive path, or from Control Panel &gt; Programs and Features &gt; Installed<\/p>\n<figure id=\"attachment_19366\" aria-describedby=\"caption-attachment-19366\" style=\"width: 959px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaProgramsAndFeatures.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19366\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaProgramsAndFeatures.png\" alt=\"Java application from Programs and Features\" width=\"959\" height=\"303\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaProgramsAndFeatures.png 959w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaProgramsAndFeatures-300x95.png 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaProgramsAndFeatures-768x243.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-19366\" class=\"wp-caption-text\">Java application from Programs and Features<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ff0000;\">NOTE multiple Java versions show installed on the server.\u00a0 \u00a0For resolving the vulnerability, you&#8217;ll need to download latest update from Oracle <a style=\"color: #ff0000;\" href=\"https:\/\/www.java.com\/en\/download\/\" target=\"_blank\" rel=\"noopener\">here<\/a>, install, and then remove the old versions (see that the 32 and 64 bit versions were installed)<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>From PowerShell as admin, go to the path where you saved the Java exe<\/p>\n<figure id=\"attachment_19363\" aria-describedby=\"caption-attachment-19363\" style=\"width: 1292px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstall.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19363\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstall.png\" alt=\"Java installer splash screen\" width=\"1292\" height=\"666\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstall.png 1292w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstall-300x155.png 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstall-1024x528.png 1024w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstall-768x396.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-19363\" class=\"wp-caption-text\">Java installer splash screen<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Click Close once Java installed<\/p>\n<figure id=\"attachment_19364\" aria-describedby=\"caption-attachment-19364\" style=\"width: 704px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstallComplete.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19364\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstallComplete.png\" alt=\"Java install completed\" width=\"704\" height=\"389\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstallComplete.png 704w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/JavaInstallComplete-300x166.png 300w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><figcaption id=\"caption-attachment-19364\" class=\"wp-caption-text\">Java install completed<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Additional validation step<\/strong><\/p>\n<p>From Event Viewer, Application Event Log, look for MsiInstaller events to validate Java install successful<\/p>\n<figure id=\"attachment_19365\" aria-describedby=\"caption-attachment-19365\" style=\"width: 548px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/Java-VerifyApplicationEventLog.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19365\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/Java-VerifyApplicationEventLog.png\" alt=\"Windows Application Event Log, looking for MSIInstaller events to validate Java install successful\" width=\"548\" height=\"534\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/Java-VerifyApplicationEventLog.png 548w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/Java-VerifyApplicationEventLog-300x292.png 300w\" sizes=\"auto, (max-width: 548px) 85vw, 548px\" \/><\/a><figcaption id=\"caption-attachment-19365\" class=\"wp-caption-text\">Windows Application Event Log, looking for MSIInstaller events to validate Java install successful<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>For me, knowing that Cisco UCS application used java, I wanted to verify the alerts in SCOM, as well as the service restarted without issue.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_19367\" aria-describedby=\"caption-attachment-19367\" style=\"width: 1387px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/CheckingCiscoUCSService.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19367\" src=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/CheckingCiscoUCSService.png\" alt=\"Cisco UCS Service from services.msc\" width=\"1387\" height=\"543\" srcset=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/CheckingCiscoUCSService.png 1387w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/CheckingCiscoUCSService-300x117.png 300w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/CheckingCiscoUCSService-1024x401.png 1024w, https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/CheckingCiscoUCSService-768x301.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-19367\" class=\"wp-caption-text\">Cisco UCS Service from services.msc<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Happy trails, being compliant and secure!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; If you&#8217;re responsible for security compliance with SCOM servers, there will be times when applications need to be upgraded.\u00a0 \u00a0Current effort is Java vulnerabilities on your SCOM servers, current examples are plugIn ID&#8217;s\u00a0 170161,166316.\u00a0 Compliance and Security are big deals, even in air-gapped networks.\u00a0 \u00a0Why &#8211; even if external hacking risk is low, the &hellip; <a href=\"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;ACAS scan for Java vulns PlugIn ID&#8217;s 170161,166316&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,530,502],"tags":[606,608,607,201,609,605,342],"class_list":["post-19360","post","type-post","status-publish","format-standard","hentry","category-administration","category-scom","category-security","tag-cisco-ucs","tag-id-166316","tag-id-170161","tag-java","tag-nessus","tag-oracle","tag-scom"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ACAS scan for Java vulns PlugIn ID&#039;s 170161,166316 - Kevin Justin&#039;s Blog<\/title>\n<meta name=\"description\" content=\"Resolve Java vulnerabilities 170161 166316 on your SCOM servers\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ACAS scan for Java vulns PlugIn ID&#039;s 170161,166316 - Kevin Justin&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"Resolve Java vulnerabilities 170161 166316 on your SCOM servers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/\" \/>\n<meta property=\"og:site_name\" content=\"Kevin Justin&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-20T19:53:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg\" \/>\n<meta name=\"author\" content=\"WordPress Administrator\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WordPress Administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/\"},\"author\":{\"name\":\"WordPress Administrator\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"headline\":\"ACAS scan for Java vulns PlugIn ID&#8217;s 170161,166316\",\"datePublished\":\"2023-04-20T19:53:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/\"},\"wordCount\":491,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/java-win-update-672x372-1.jpg\",\"keywords\":[\"cisco ucs\",\"id 166316\",\"id 170161\",\"java\",\"nessus\",\"oracle\",\"SCOM\"],\"articleSection\":[\"Administration\",\"SCOM\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/\",\"name\":\"ACAS scan for Java vulns PlugIn ID's 170161,166316 - Kevin Justin&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/java-win-update-672x372-1.jpg\",\"datePublished\":\"2023-04-20T19:53:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\"},\"description\":\"Resolve Java vulnerabilities 170161 166316 on your SCOM servers\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/java-win-update-672x372-1.jpg\",\"contentUrl\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/java-win-update-672x372-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/2023\\\/04\\\/20\\\/acas-scan-for-java-vulns-plugin-ids-170161166316\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ACAS scan for Java vulns PlugIn ID&#8217;s 170161,166316\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/\",\"name\":\"Kevin Justin&#039;s Blog\",\"description\":\"Operational monitoring tools including System Center, Azure Monitor\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/#\\\/schema\\\/person\\\/3d7a90f4430bef43134eaa0a7e2cd508\",\"name\":\"WordPress Administrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g\",\"caption\":\"WordPress Administrator\"},\"sameAs\":[\"https:\\\/\\\/kevinjustin.com\"],\"url\":\"https:\\\/\\\/kevinjustin.com\\\/blog\\\/author\\\/wordpress_admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ACAS scan for Java vulns PlugIn ID's 170161,166316 - Kevin Justin&#039;s Blog","description":"Resolve Java vulnerabilities 170161 166316 on your SCOM servers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/","og_locale":"en_US","og_type":"article","og_title":"ACAS scan for Java vulns PlugIn ID's 170161,166316 - Kevin Justin&#039;s Blog","og_description":"Resolve Java vulnerabilities 170161 166316 on your SCOM servers","og_url":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/","og_site_name":"Kevin Justin&#039;s Blog","article_published_time":"2023-04-20T19:53:43+00:00","og_image":[{"url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg","type":"","width":"","height":""}],"author":"WordPress Administrator","twitter_card":"summary_large_image","twitter_misc":{"Written by":"WordPress Administrator","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#article","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/"},"author":{"name":"WordPress Administrator","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"headline":"ACAS scan for Java vulns PlugIn ID&#8217;s 170161,166316","datePublished":"2023-04-20T19:53:43+00:00","mainEntityOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/"},"wordCount":491,"commentCount":0,"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg","keywords":["cisco ucs","id 166316","id 170161","java","nessus","oracle","SCOM"],"articleSection":["Administration","SCOM","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/","url":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/","name":"ACAS scan for Java vulns PlugIn ID's 170161,166316 - Kevin Justin&#039;s Blog","isPartOf":{"@id":"https:\/\/kevinjustin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#primaryimage"},"image":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#primaryimage"},"thumbnailUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg","datePublished":"2023-04-20T19:53:43+00:00","author":{"@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508"},"description":"Resolve Java vulnerabilities 170161 166316 on your SCOM servers","breadcrumb":{"@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#primaryimage","url":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg","contentUrl":"https:\/\/kevinjustin.com\/blog\/wp-content\/uploads\/2023\/04\/java-win-update-672x372-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/kevinjustin.com\/blog\/2023\/04\/20\/acas-scan-for-java-vulns-plugin-ids-170161166316\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kevinjustin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ACAS scan for Java vulns PlugIn ID&#8217;s 170161,166316"}]},{"@type":"WebSite","@id":"https:\/\/kevinjustin.com\/blog\/#website","url":"https:\/\/kevinjustin.com\/blog\/","name":"Kevin Justin&#039;s Blog","description":"Operational monitoring tools including System Center, Azure Monitor","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kevinjustin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kevinjustin.com\/blog\/#\/schema\/person\/3d7a90f4430bef43134eaa0a7e2cd508","name":"WordPress Administrator","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fca865cc5df90a25ae9533b1d9dea567a78c7469dc3202a376c8d117a0eaea11?s=96&d=mm&r=g","caption":"WordPress Administrator"},"sameAs":["https:\/\/kevinjustin.com"],"url":"https:\/\/kevinjustin.com\/blog\/author\/wordpress_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/19360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/comments?post=19360"}],"version-history":[{"count":1,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/19360\/revisions"}],"predecessor-version":[{"id":19368,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/posts\/19360\/revisions\/19368"}],"wp:attachment":[{"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/media?parent=19360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/categories?post=19360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjustin.com\/blog\/wp-json\/wp\/v2\/tags?post=19360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}