SUN Java Runtime (JRE) Vulnerabilities

“Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers.”

Find out More Here

Leave a comment

Design a site like this with WordPress.com
Get started