The host is installed with Oracle Java SE and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to deployment. Successful exploitation allow remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality.