{"id":2454,"date":"2013-04-17T00:00:00","date_gmt":"2013-04-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/17\/java-7-update-21-to-fix-bugs-change-applet-warning-messages\/"},"modified":"2021-12-30T11:41:22","modified_gmt":"2021-12-30T11:41:22","slug":"java-7-update-21-to-fix-bugs-change-applet-warning-messages","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/17\/java-7-update-21-to-fix-bugs-change-applet-warning-messages\/","title":{"rendered":"Java 7 Update 21 to fix bugs, change applet warning messages"},"content":{"rendered":"<p>Oracle will release a new version of Java on Tuesday that will include 42 security fixes and will make changes to how Web-based Java content will be presented inside browsers. Thirty-nine of the vulnerabilities patched by the new Java 7 Update 21 (7u21) can be exploited remotely without authentication, Oracle said in a pre-release announcement. In addition to security fixes, the new update will also make changes to how Java applets &#8212; Web-based Java applications &#8212; are handled and presented in Web browsers that have the Java plug-in enabled.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The Java 7u21 release introduces changes to security messages related to running Java applets and applications,&#8221; Oracle said in a technical document that explains the changes.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\">In cases where the risk of an attack is lower, like when the applet is digitally signed with a CA-issued certificate, the messages displayed to users will be minimal and there will be an option to automatically trust applications from the same vendors in the future.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The company has published an overview of all use cases of signed and unsigned applets with example of how the warning dialogs will look in each case.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">This new release is the result of Oracle&#8217;s plan to accelerate its patching cycle for Java and will coincide with the release of security updates for other Oracle applications and middleware products that used to be updated separately.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.computerworld.com\/s\/article\/9238423\/Java_7_Update_21_to_fix_bugs_change_applet_warning_messages?source=CTWNLE_nlt_pm_2013-04-16\">http:\/\/www.computerworld.com\/s\/article\/9238423\/Java_7_Update_21_to_fix_bugs_change_applet_warning_messages?source=CTWNLE_nlt_pm_2013-04-16<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2454","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2454"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2454\/revisions"}],"predecessor-version":[{"id":4941,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2454\/revisions\/4941"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}