Vulnerable Systems:
* Oracle JRockit R28.0.1 and prior
An attacker may exploit the vulnerability by using a malicious Web page. A successful exploit will let the attacker execute arbitrary code with the privileges of the currently logged-in user.This vulnerability affects the following supported versions:
6 Update 21, 5.0 Update 25, 1.4.2_27
Vendor Status:
Vendor as issued an updated vulnerability.