Bypassing Permission Checks in IBM Java Virtual Machine

Bypassing Permission Checks in IBM Java Virtual Machine

CVE-2015-1914 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.

Learn more about our Web Application Penetration Testing UK.