![]() Further information is available via the Sun Java website at These issues are addressed by updating to Java version 1.6.0_20. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. ![]() ![]() Impact: Multiple vulnerabilities in Java 1.6.0_17ĭescription: Multiple vulnerabilities exist in Java 1.6.0_17, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |