The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Java 1.6.0_51 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle a maliciously crafted untrusted Java applet. Successful exploitation could allow attackers to execute arbitrary code.