Oracle released quarterly security patch updates. A total of 128 Security Vulnerabilities were fixed, 42 of which were Java SE security vulnerabilities, 19 of which were high-risk vulnerabilities, and 39 were related to the Java Web Start plug-in. Java is mainly used on the server, and few websites require clients to run Java applets. Oracle recommends that enterprises and organizations update application security as quickly as possible. In the past few months, Internet companies have reported that computers have been hacked due to the zero-day Java (mainly plug-ins) vulnerability. Security experts worry that, based on the frequency of New Java Vulnerabilities discovered, Java will remain vulnerable to attacks for a long time.
Oracle released its quarterly Critical Patch Update (CPU) for each L, whichAddressed a whopping 128 security issues authentication SS multiple product families.As part of its update, Oracle released a Java SE Critical Patch Update to plug 42 security holes in Java, 19 with base CVE score of 10 (the highest you can go) and 39 related to the Java Web Start plugin which can be remotely exploited without authentication. according to security analyst Wade William amson, organizations need to realize that Java will continue to pose a significant risk. 'The first step is for an organization to understand precisely where and why Java is needed, 'William son wrote. 'Based on the rate of newly discovered vulnerabilities, security teams sholdAssume that Java is and will continue to be vulnerable.'Organizations shoshould to take a long, hard look at Java and answer for themselves if it's worth it, William amson added. Due to the threat posed by a successful attack, Oracle isStrongly recommendingThat organizations apply the security fixes as soon as possible.