Java software allows you to run applications called

Java Runtime Environment for Mac

Java JRE 8 Update 77

  -  64.27 MB  -  Freeware

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Java JRE 8 Update 77.


For those interested in downloading the most recent release of Java Runtime Environment for Mac or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Java JRE 8 Update 77 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Java JRE 8 Update 77 Screenshot 1
  • Java JRE 8 Update 77 Screenshot 2
  • Java JRE 8 Update 77 Screenshot 3

What's new in this version:

IANA Data 2016a:
- JDK 8u77 contains IANA time zone data version 2016a.

Security Baselines:
- The security baselines for the Java Runtime Environment (JRE) at the time of the release of JDK 8u77 is 1.8.0_77.

JRE Expiration Date:
- This JRE (version 8u77) will expire with the release of the next critical patch update scheduled for April 19, 2016.

Notes:
- This Security Alert (8u77) is based off the earlier 8u74 PSU release. All users of earlier JDK 8 releases should update to this release.

Bug Fixes:
- This Security Alert addresses CVE-2016-0636, a vulnerability affecting Java SE running in web browsers on desktops. This vulnerability is not applicable to Java deployments, typically in servers or standalone desktop applications, that load and run only trusted code. It also does not affect Oracle server-based software. This vulnerability may be remotely exploitable without authentication (i.e., may be exploited over a network without the need for a username and password). To be successfully exploited, an unsuspecting user running an affected release in a browser will need to visit a malicious web page that leverages this vulnerability. Successful exploits can impact the availability, integrity, and confidentiality of the user's system.
- Due to the severity of this vulnerability and the public disclosure of technical details, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.