The host is installed with Oracle Java SE 6 Update 35 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to deployment. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.