a Java Security Exploit


A term that refers to any number of security exploits in Oracle’s Java software, which has a long history of being vulnerable to security flaws. The most recent Java Security Exploit appeared in early 2013, and affected all versions of Java up to Java 7 Update 10.

This zero-day security vulnerability, referenced as CVE-2013-0422 by the CVE, carried a payload of malware that could result in identity theft as well as rendering the host machine an unauthorized botnet that could then be used in denial-of-service (DoS) attacks against other machines.

Oracle periodically releases software patches developed to address Java security exploits, and it released one as Java 7 Update 11 two days after the most recent vulnerability was discovered. Only days after that patch debuted, a new zero-day Java security exploit was publicized and marketed by crimeware sites for $5,000.

Read Also:

  • a Security Vulnerabity

    An unintended flaw in software code or a system that leaves it open to the potential for exploitation in the form of unauthorized access or malicious behavior such as viruses, worms, Trojan horses and other forms of malware. Also referred to as security exploits, security vulnerabilities can result from software bugs, weak passwords or software […]

  • Google Nexus

    A line of smartphones and tablet devices developed by Google and various hardware partners. The Google Nexus first debuted in early 2010 as the Nexus One, and today the line consists of the Google Nexus 4, Nexus 7 and Nexus 10 devices. Google Nexus devices are powered by Google’s Android open source mobile operating system. […]

  • 802.11ad

    A wireless LAN (WLAN) specification under development by the IEEE (Institute of Electrical and Electronics Engineers) that will serve as the successor to the 802.11ac specification, which is also currently under development. The 802.11ad standard is expected to be approved by the IEEE in 2014. The 802.11ad specification operates in the 60GHz frequency band, as […]

  • Phablet (phone tablet hybrid)

    A phrase used to describe a half-smartphone and half-tablet mobile device (a phone/tablet hybrid). A phablet is a small pocket-sized mobile device that is a bit larger than the size of an average smartphone, with a touch screen ranging in size from 5 inches (e.g. the Sony Xperia Z) to 6.1 inches (e.g. the Huawei […]

  • 802.11ac (Gigabit Wi-Fi)

    A wireless LAN (WLAN) specification under development by the IEEE (Institute of Electrical and Electronics Engineers) that delivers wireless data transfer rates in the range of 433 Mbps (Megabits per second) per spatial stream. With support for up to eight streams, the 802.11ac specification offers a theoretical maximum data transfer speed of more than 3Gbps […]


Disclaimer: a Java Security Exploit definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.