<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/java-applet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Fri, 22 Nov 2013 02:37:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>Java 7 Update 6 0-Day Exploit in the Wild</title>
		<link>https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/</link>
					<comments>https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 30 Aug 2012 11:53:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[Java applet]]></category>
		<category><![CDATA[Java Virtual Machine]]></category>
		<category><![CDATA[Oracle Corporation]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Zero-day attack]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=390</guid>

					<description><![CDATA[Java, a programming language whose runtime libraries are used by millions of computer systems all over the world, has several vulnerabilities, one of which is already exploitable by malicious hackers.]]></description>
										<content:encoded><![CDATA[<p><a href="http://commons.wikimedia.org/wiki/File%3AJava_logo_and_wordmark.svg" target="_blank"><img decoding="async" class="zemanta-img-inserted zemanta-img-configured alignleft" title="Java (programming language)" alt="Java (programming language)" src="http://upload.wikimedia.org/wikipedia/commons/a/a4/Java_logo_and_wordmark.svg" width="144" height="264" /></a></p>
<p>The latest version of Java &#8211; Version 7 Update 6 &#8211; has several vulnerabilities, one of which a proof-of-concept exploit has been <a title="Zero Day Season is not over yet" href="http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html" target="_blank">released in the wild</a>. <span id="more-390"></span>Rapid7, owners of the <a title="Metasploit" href="http://www.rapid7.com/products/penetration-testing.jsp" target="_blank">Metasploit Framework</a>, already has a<a title="Let's start the week with a new Java 0-day in Metasploit" href="https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day" target="_blank"> working update to exploit the vulnerability</a>.</p>
<p>It seems that Oracle <a title="Oracle knew about critical Java flaws since April" href="http://www.theregister.co.uk/2012/08/30/oracle_knew_about_flaws/" target="_blank" data-bitly-type="bitly_hover_card">knew of the vulnerabilities since April</a> of this year and as of today, they remain unpatched. A lot of developers believe that Oracle has not been friendly to software projects of Sun, such as Java, MySQL and Open Office, and this is just one piece of evidence to suggest that. We would not be surprised, as Oracle acquired Sun for their hardware business.</p>
<p>We suggest disabling Java in your browsers until the vulnerabilities are patched and run it only on trusted, signed sites. Mozilla Firefox’s latest update is already <a title="Protecting Users Against Java Security Vulnerability" href="https://blog.mozilla.org/security/2012/08/28/protecting-users-against-java-security-vulnerability/" target="_blank" data-bitly-type="bitly_hover_card">blocking the unsafe versions of Java by default</a>.</p>
<p>Be safe out there.</p>
<p><span style="text-decoration: underline;"><strong>Update:</strong></span> Oracle has fixed the critical vulnerabilities. We recommend that you apply the patch as soon as possible. You can read more about the fix <a title="Security Alert for CVE-2012-4681 Released" href="https://blogs.oracle.com/security/entry/security_alert_for_cve_20121" target="_blank">here</a>.</p>
<p>It doesn&#8217;t appear that all the vulnerabilities identified by researchers have been addressed and we hope that those fixes will be forthcoming before the next proof-of-concept exploit is released.</p>
<div class="zemanta-pixie"><img decoding="async" class="zemanta-pixie-img" alt="" src="http://img.zemanta.com/pixy.gif?x-id=0349ed0e-6f3a-4687-82c2-0c8ee4affef2" /></div>
<p>Original article: <a href="https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/" rel="bookmark" title="Permanent link to 'Java 7 Update 6 0-Day Exploit in the Wild'">Java 7 Update 6 0-Day Exploit in the Wild</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/java-7-update-6-0-day-exploit-in-the-wild/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">390</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 36/45 queries in 0.010 seconds using Disk

Served from: www.interxect.com @ 2025-06-13 08:53:46 by W3 Total Cache
-->