![]() While Java 6 users remain vulnerable, the bug has been patched in Java 7. The bug was assigned a score of ten out of ten in Oracle's Common Vulnerability Scoring System - rating the flaw of extreme importance. The vulnerability "can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets," according to Oracle's Java SE Critical Patch Update Advisory in June. "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D." The bug, CVE-2013-2463, is rated as "critical," and is described below: The final fix for the out-of-date Java 6 platform was released by Oracle in April. Remote work vs back to the office? It's not that simpleĪ number of security experts warn that businesses which fail to update from Java 6 on their systems are vulnerable to attack. How to become a software engineer at AmazonĬut the cord: Best live TV streaming service This controversial Starbucks move put me off coffeeĬISA warns: Here are 66 more security flaws
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |