{"id":40402,"date":"2015-04-15T12:05:20","date_gmt":"2015-04-15T19:05:20","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=40402"},"modified":"2015-04-15T12:10:02","modified_gmt":"2015-04-15T19:10:02","slug":"oracle-issues-critical-updates-for-java-releases-java-se-8u45","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/","title":{"rendered":"Oracle Issues Critical Updates for Java, Releases Java SE 8u45"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-38929\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/Java-Mac-Security.png\" alt=\"Java for Mac Installs Ask toolbar\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/Java-Mac-Security.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/Java-Mac-Security-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/Java-Mac-Security-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Oracle has released an update for Java SE that addresses 14 security bugs, all of which may be exploitable over a network without the need for a username and password.<\/p>\n<p>With this update, after April 2015, Oracle will <a title=\"Oracle Java SE Support Roadmap\" href=\"http:\/\/www.oracle.com\/technetwork\/java\/javase\/downloads\/eol-135779.html\" target=\"_blank\">no longer post updates of Java SE 7<\/a> to its public download sites. Since January 2015,\u00a0Oracle has been migrating<a title=\"Java 7 Auto-Update to Java 8\" href=\"http:\/\/www.oracle.com\/technetwork\/java\/javase\/downloads\/autoupdatejre7tojre8-2389085.html\" target=\"_blank\"> Java 7 users who have the auto-update feature enabled<\/a> over to Java 8, but if you haven&#8217;t converted yet, now is a good time to switch to the latest (more secure)\u00a0<a title=\"Java Downloads for All Operating Systems\" href=\"https:\/\/www.java.com\/en\/download\/manual.jsp\" target=\"_blank\">update to Java 8 Update 45<\/a>.<\/p>\n<p>Supported Java versions that are affected by one or\u00a0more vulnerabilities patched in this update include: Java SE 5.0u81, Java SE 6u91, Java SE 7u76, Java SE 8u40, Java FX 2.2.76 and JRockit R28.3.5.<\/p>\n<h3>Do you really need Java?<\/h3>\n<p>Java is widely installed across all operating systems, but\u00a0due to the way Java applets can be embedded in web pages, the bug-riddled software is an easily exploitable attack vector. Although <a title=\"Java Programming is On the Decline\u2013Is Mac Malware to Blame?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/java-programming-is-on-the-decline\/\" target=\"_blank\">Java is on the decline<\/a>, it still remains one of the most attractive targets for cyber-criminals.<\/p>\n<p>If you have Java installed and need to use Java for websites or applications, it&#8217;s a good idea to take a few minutes to update this software. If you don&#8217;t have a need for it, you should consider removing Java altogether.<\/p>\n<p>For those who wish to continue using Java, Brian Krebs via <a title=\"Critical Updates for Windows, Flash, Java\" href=\"http:\/\/krebsonsecurity.com\/2015\/04\/critical-updates-for-windows-flash-java\/#more-30672\" target=\"_blank\">Krebs on Security<\/a> provided some valuable methods you can use to help reduce your risk as a Java user. He said:<\/p>\n<blockquote><p>If you have an affirmative use or need for Java, there is a way to have this program installed while minimizing the chance that crooks will exploit unknown or unpatched flaws in the program: unplug it from the browser unless and until you\u2019re at a site that requires it (or at least take advantage of <a href=\"http:\/\/krebsonsecurity.com\/2013\/03\/help-keep-threats-at-bay-with-click-to-play\/\" target=\"_blank\">click-to-play<\/a>, which can block Web sites from displaying both Java and Flash content by default). The latest versions of Java let users <a href=\"http:\/\/www.java.com\/en\/download\/help\/disable_browser.xml\" target=\"_blank\">disable Java content in web browsers<\/a> through the <a href=\"http:\/\/www.java.com\/en\/download\/help\/javaconsole.xml\" target=\"_blank\">Java Control Panel<\/a>. Alternatively, consider a dual-browser approach, unplugging Java from the browser you use for everyday surfing, and leaving it plugged in to a second browser that you only use for sites that require Java.<\/p><\/blockquote>\n<h3>Java vulnerabilities<\/h3>\n<p>For those of you interested, here&#8217;s a list of the vulnerabilities that <a title=\"Oracle Critical Patch Update Advisory - April 2015\" href=\"http:\/\/www.oracle.com\/technetwork\/topics\/security\/cpuapr2015-2365600.html\" target=\"_blank\">Oracle patched<\/a> in the latest Java update:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0204\" target=\"_blank\">CVE-2015-0204<\/a> : Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: JSSE). Very difficult to exploit vulnerability allows successful unauthenticated network attacks via SSL\/TLS. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to some Java SE, JRockit accessible data as well as read access to a subset of Java SE, JRockit accessible data.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0458\" target=\"_blank\">CVE-2015-0458<\/a> : Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Very difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0459\" target=\"_blank\">CVE-2015-0459<\/a> : Vulnerability in the Java SE, JavaFX component of Oracle Java SE (subcomponent: 2D). Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0460\" target=\"_blank\">CVE-2015-0460<\/a> : Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Hotspot). Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0469\" target=\"_blank\">CVE-2015-0469<\/a> : Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0470\" target=\"_blank\">CVE-2015-0470<\/a> : Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Hotspot). Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to some Java SE accessible data.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0477\" target=\"_blank\">CVE-2015-0477<\/a> : Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Beans). Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to some Java SE accessible data.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0478\" target=\"_blank\">CVE-2015-0478<\/a> : Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: JCE). Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized read access to a subset of Java SE, JRockit accessible data.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0480\" target=\"_blank\">CVE-2015-0480<\/a> : Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Tools). Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to some Java SE accessible data and ability to cause a partial denial of service (partial DOS) of Java SE.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0484\" target=\"_blank\">CVE-2015-0484<\/a> : Vulnerability in the Java SE, JavaFX component of Oracle Java SE (subcomponent: JavaFX). Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized update, insert or delete access to some Java SE, JavaFX accessible data as well as read access to a subset of Java SE, JavaFX accessible data and ability to cause a partial denial of service (partial DOS) of Java SE, JavaFX.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0486\" target=\"_blank\">CVE-2015-0486<\/a> : Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0488\" target=\"_blank\">CVE-2015-0488<\/a> : Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: JSSE). Easily exploitable vulnerability allows successful unauthenticated network attacks via SSL\/TLS. Successful attack of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0491\" target=\"_blank\">CVE-2015-0491<\/a> : Vulnerability in the Java SE, JavaFX component of Oracle Java SE (subcomponent: 2D). Easily exploitable vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0492\" target=\"_blank\">CVE-2015-0492<\/a> : Vulnerability in the Java SE, JavaFX component of Oracle Java SE (subcomponent: JavaFX). Difficult to exploit vulnerability allows successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability can result in unauthorized Operating System takeover including arbitrary code execution.<\/li>\n<\/ul>\n<p>For those who use Java, we recommend updating immediately. Java users can head over to Oracle&#8217;s website to <a title=\"Java SE - Downloads\" href=\"http:\/\/www.oracle.com\/technetwork\/java\/javase\/downloads\/index.html\" target=\"_blank\">download Java SE 8u45<\/a> as advised. Users running Java SE with a browser can download the latest release from <a title=\"Java.com\" href=\"http:\/\/java.com\/\" target=\"_blank\">Java.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oracle released Java SE 8u45, closing 14 security bugs exploitable over a network without the need for a username and password. Update to Java 8 Update 45 now.<\/p>\n","protected":false},"author":4,"featured_media":9921,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[75,2149,2146,183],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Oracle released Java SE 8u45, closing 14 security bugs exploitable over a network without the need for a username and password. Update to Java 8 Update 45 now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Oracle Issues Critical Updates for Java, Releases Java SE 8u45 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Oracle released Java SE 8u45, closing 14 security bugs exploitable over a network without the need for a username and password. Update to Java 8 Update 45 now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-15T19:05:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-04-15T19:10:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Java security updates\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/\",\"name\":\"Oracle Issues Critical Updates for Java, Releases Java SE 8u45 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#primaryimage\"},\"datePublished\":\"2015-04-15T19:05:20+00:00\",\"dateModified\":\"2015-04-15T19:10:02+00:00\",\"description\":\"Oracle released Java SE 8u45, closing 14 security bugs exploitable over a network without the need for a username and password. Update to Java 8 Update 45 now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Oracle Issues Critical Updates for Java, Releases Java SE 8u45\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Oracle Issues Critical Updates for Java, Releases Java SE 8u45\",\"datePublished\":\"2015-04-15T19:05:20+00:00\",\"dateModified\":\"2015-04-15T19:10:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#webpage\"},\"wordCount\":1122,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png\",\"keywords\":[\"Java\",\"Java 8\",\"Java SE 8u45\",\"Oracle\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Oracle released Java SE 8u45, closing 14 security bugs exploitable over a network without the need for a username and password. Update to Java 8 Update 45 now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/","og_locale":"en_US","og_type":"article","og_title":"Oracle Issues Critical Updates for Java, Releases Java SE 8u45 - The Mac Security Blog","og_description":"Oracle released Java SE 8u45, closing 14 security bugs exploitable over a network without the need for a username and password. Update to Java 8 Update 45 now.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-04-15T19:05:20+00:00","article_modified_time":"2015-04-15T19:10:02+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png","width":"400","height":"260","caption":"Java security updates"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/","name":"Oracle Issues Critical Updates for Java, Releases Java SE 8u45 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#primaryimage"},"datePublished":"2015-04-15T19:05:20+00:00","dateModified":"2015-04-15T19:10:02+00:00","description":"Oracle released Java SE 8u45, closing 14 security bugs exploitable over a network without the need for a username and password. Update to Java 8 Update 45 now.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Oracle Issues Critical Updates for Java, Releases Java SE 8u45"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Oracle Issues Critical Updates for Java, Releases Java SE 8u45","datePublished":"2015-04-15T19:05:20+00:00","dateModified":"2015-04-15T19:10:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#webpage"},"wordCount":1122,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png","keywords":["Java","Java 8","Java SE 8u45","Oracle"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/oracle-issues-critical-updates-for-java-releases-java-se-8u45\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Java-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-avE","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40402"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=40402"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40402\/revisions"}],"predecessor-version":[{"id":40459,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40402\/revisions\/40459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9921"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=40402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=40402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=40402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}