|25 Apr 2013||#1|
| || |
Java Sandbox Bypass Discovered that Breaks Latest Update
Optimism and praise followed last week’s Java critical patch update. Oracle not only patched 42 vulnerabilities in the Java browser plug-in, but also added new code-signing restrictions and new prompts warning users when applets are potentially malicious. It took less than a week, however, to deflate any good will toward Java that resulted.
Noted Java bug hunter Adam Gowdiak, founder and CEO of Security Explorations of Poland, said this week that he reported to Oracle a new Reflection API vulnerability that affects all Java versions, including 7u21 released last Tuesday.
|My System Specs|
|Similar help and support threads for2: Java Sandbox Bypass Discovered that Breaks Latest Update|
|Researcher Finds Five New Java Sandbox Vulnerabilities||Security News|
|Java Update-Now I get a security warning for programs that run java||General Discussion|
|New vulnerabilities found in latest Java update||Security News|
|Firefox Java error after latest install version 7 update 26-27||Browsers & Mail|
|BIOS - Incremental updates to latest vrsn or direct update to latest?||Drivers|
|Oracle Java SE and Java for Business Critical Patch Update||Security News|
|Researcher breaks security sandbox in Adobe Flash||Security News|