The Only World-Standard SEO Software

SEO and Internet Marketing Forum
Welcome, Guest ( Login | Register )

Java vulnerability - does this affect Link-Assistant ?
New Topic Add Reply
Page 2 of 2 [ 14 posts ]
Author Message
scanreg

Small God

Small God
Posts: 226
Posted: Fri Jan 25, 2013 1:40 pm

okay, thanks, big relief :)

LinkAssistant

User avatar
Site Admin
Posts: 5625
Posted: Fri Jan 25, 2013 2:52 pm

scanreg wrote:
okay, thanks, big relief :)


;)

pixelmac

Senior

Senior
Posts: 21
Posted: Sun Nov 02, 2014 8:28 pm

Hello,

Just ran DrWeb on my Mac, found in all PowerSuite apps this "Exploit:Java/CVE-2011-3544.A"
------------
Exploit:Java/CVE-2011-3544.A is a malicious Java applet stored within a Java Archive (.JAR) file. It attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle JAVA SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
-------------

What do you recommend to do ?

Dan

LinkAssistant

User avatar
Site Admin
Posts: 5625
Posted: Mon Nov 03, 2014 10:31 am

pixelmac wrote:
Just ran DrWeb on my Mac, found in all PowerSuite apps this "Exploit:Java/CVE-2011-3544.A"
------------
Exploit:Java/CVE-2011-3544.A is a malicious Java applet stored within a Java Archive (.JAR) file. It attempts to exploit a vulnerability in the Java Runtime Environment (JRE) component in Oracle JAVA SE JDK and JRE 7, 6 Update 27 and earlier. The vulnerability allows an unsigned Java applet to gain elevated privileges and potentially have unrestricted access to run arbitrary Java code outside of the "sandbox" environment.
-------------

What do you recommend to do ?


Do not worry, this is a false positive alarm which may happen with any anti-virus. We fully test all our files and we guarantee 100% that they do not contain any malicious code.

Display topics from previous:    Sort by    
New Topic Add Reply
Page 2 of 2 [ 14 posts ]
All times are UTC

Jump to:  


cron