diablo-jdk-1.6.0.07.02_5 remote code execution exploit
Klaus Koch
klaus at sentinel.dyndns.info
Sun Aug 9 09:30:37 UTC 2009
Hello,
as of 6th of August, there's a possible remote code execution exploit known in
both "Sun JDK and JRE 6 Update 14 and earlier" and "Sun JDK and JRE 5.0
Update 19 and earlier"
details: http://www.cert.fi/en/reports/2009/vulnerability2009085.html
I didn't get any notifications with portaudit yet. Because I don't know who to
contact else, I'm sending this to the port maintainer/team.
Kind regards,
Klaus
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-ports/attachments/20090809/9ef83da8/attachment.pgp
More information about the freebsd-ports
mailing list