The host is installed with JRE or JDK 6 Update 4 or earlier, 5.0 Update 14 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle an untrusted application. Successful exploitation could allow attackers to gain privileges.