First published: Wed Oct 19 2011(Updated: )
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sun JRE | =1.7.0 | |
Sun JDK | =1.7.0 | |
Sun JDK | =1.6.0-update_4 | |
Sun JRE | =1.6.0-update_3 | |
Sun JRE | =1.6.0-update_5 | |
Sun JDK | =1.6.0-update_7 | |
Sun JDK | =1.6.0-update_19 | |
Sun JDK | =1.6.0-update_13 | |
Sun JRE | =1.6.0-update_13 | |
Sun JRE | =1.6.0-update_24 | |
Sun JRE | =1.6.0-update_1 | |
Sun JRE | =1.6.0-update_2 | |
Sun JDK | =1.6.0-update_24 | |
Sun JDK | =1.6.0-update_3 | |
Sun JDK | =1.6.0-update_22 | |
Sun JRE | =1.6.0-update_16 | |
Sun JDK | =1.6.0-update_11 | |
Sun JRE | =1.6.0-update_20 | |
Sun JDK | =1.6.0-update_10 | |
Sun JRE | =1.6.0-update_15 | |
Sun JRE | =1.6.0-update_22 | |
Sun JRE | <=1.6.0 | |
Sun JRE | =1.6.0-update_6 | |
Sun JDK | =1.6.0-update_14 | |
Sun JDK | =1.6.0 | |
Sun JDK | =1.6.0-update_17 | |
Sun JRE | =1.6.0-update_19 | |
Sun JRE | =1.6.0 | |
Sun JDK | =1.6.0-update_5 | |
Sun JRE | =1.6.0-update_18 | |
Sun JDK | =1.6.0-update_23 | |
Sun JDK | =1.6.0-update2 | |
Sun JRE | =1.6.0-update_10 | |
Sun JDK | =1.6.0-update_21 | |
Sun JRE | =1.6.0-update_25 | |
Sun JRE | =1.6.0-update_23 | |
Sun JDK | =1.6.0-update_16 | |
Sun JDK | =1.6.0-update1 | |
Sun JRE | =1.6.0-update_17 | |
Sun JDK | <=1.6.0 | |
Sun JDK | =1.6.0-update_26 | |
Sun JRE | =1.6.0-update_21 | |
Sun JRE | =1.6.0-update_7 | |
Sun JRE | =1.6.0-update_14 | |
Sun JDK | =1.6.0-update_15 | |
Sun JDK | =1.6.0-update_12 | |
Sun JDK | =1.6.0-update_25 | |
Sun JRE | =1.6.0-update_26 | |
Sun JRE | =1.6.0-update_4 | |
Sun JDK | =1.6.0-update_18 | |
Sun JDK | =1.6.0-update_6 | |
Sun JDK | =1.6.0-update_20 | |
Sun JRE | =1.6.0-update_12 | |
Sun JRE | =1.6.0-update_11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.