![]() ![]() ![]() It, therefore, potentially can allow remote code execution due to the following vulnerabilities related to the '2D' sub-component : - An integer overflow error exists related to handling sample model instances that could result in memory corruption leading to arbitrary code execution. ![]() Description The version of Oracle (formerly Sun) Java Runtime Environment (JRE) 6.x installed on the remote host is earlier than Update 43. Synopsis The remote host contains a runtime environment that can allow code execution. ![]()
0 Comments
Leave a Reply. |