Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

1/28/2016
12:40 PM
50%
50%

Oracle Retires Java Browser Plug-In

Move in response to the 'plug-in free Web' trend.

It's official: the plug-in is on its way out. Oracle -- under pressure from moves by Google and other browser makers to remove plug-in support -- now plans to eliminate the Java browser plug-in.

"With modern browser vendors working to restrict and reduce plugin support in their products, developers of applications that rely on the Java browser plugin need to consider alternative options such as migrating from Java Applets (which rely on a browser plugin) to the plugin-free Java Web Start technology," Oracle wrote in a blog post announcing the move.

The Java browser plug-in will be dead as of JDK 9. "This technology will be removed from the Oracle JDK and JRE in a future Java SE release," Oracle says.

To read more about Oracle's historic move, see this blog post and this white paper.

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/31/2016 | 11:22:14 PM
Re: Microsoft Silverlight Next?
What did they move to from Silverlight?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/31/2016 | 11:21:18 PM
Re: Good Start
I very much agree with you. HTML5 has been proven to be a source of fewer vulnerabilities. However, if it becomes more mainstream do we think maybe HTML5 will become more vulnerable in the future?
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/30/2016 | 11:14:34 AM
Re: Microsoft Silverlight Next?
"... Microsoft Silverlight Next?  ..."

I am not sure if anybody using Silverlight for their projects anymore. Anybody I talked to recently they were all got out of it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/30/2016 | 11:10:44 AM
Re: Microsoft Silverlight Next?
" ... plug-in free web movement ..."

I agree. There should be less need to plug-ins, we need to be ready to switch between apps if we go with that tough. There is not going to be one app that does everything we want.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/30/2016 | 11:08:09 AM
Re: Good Start
"... Java SDK dependencies pose a larger risk ..."

Everything related to client side should go to HTML5 in my view. It is hard to keep up with vulnerabilities if there are too many options.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/30/2016 | 11:05:02 AM
Java Applets
 

It was big and flashy when it was intruded. Like flash, it is very powerful tool but their time has passed.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
1/28/2016 | 5:30:04 PM
Microsoft Silverlight Next?
I am so happy I am speechless!  The importance of this move will be understood over the next couple years.  Finally, kudos to Oracle for "getting it" - at least on plug-in free web movement.  Next?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/28/2016 | 3:48:32 PM
Good Start
This is a good start but I think Java SDK dependencies pose a larger risk due to the level of effort behind upgrading along with app testing than retiring a plugin would. Can someone explain this in further detail?
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7753
PUBLISHED: 2020-10-27
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) [DNP] via trim().
CVE-2020-27182
PUBLISHED: 2020-10-27
Multiple cross-site scripting (XSS) vulnerabilities in konzept-ix publiXone before 2020.015 allow remote attackers to inject arbitrary JavaScript or HTML via appletError.jsp, job_jacket_detail.jsp, ixedit/editor_component.jsp, or the login form.
CVE-2020-27183
PUBLISHED: 2020-10-27
A RemoteFunctions endpoint with missing access control in konzept-ix publiXone before 2020.015 allows attackers to disclose sensitive user information, send arbitrary e-mails, escalate the privileges of arbitrary user accounts, and have unspecified other impact.
CVE-2020-8956
PUBLISHED: 2020-10-27
Pulse Secure Desktop Client 9.0Rx before 9.0R5 and 9.1Rx before 9.1R4 on Windows reveals users' passwords if Save Settings is enabled.
CVE-2020-15352
PUBLISHED: 2020-10-27
An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9 allows remote authenticated admins to conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.