A few days after Oracle released its critical patch for Java, and CVE-2013-2423 is already being exploited. Upon checking the history, the exploitation seems to have begun on April 21st and is still actively happening (as of this post): For a closer look, the image below contains a comparison of the classes found in the Metasploit module and that of the ITW sample: Interestingly, the Metasploit mo
One week after Patch Java7u21 the vulnerability is being exploited in mass blind attack. ( First alert come from Timo Hirvonen with CrimeBoss and later CritXPack/SafePack. Will update for these EK as soon as i land on it) Cool EK: GET http://lekarskiejowlslight.ahmedpekin .net/works-softly.htm 200 OK (text/html) GET http://lekarskiejowlslight.ahmedpekin .net/hopeful_orchestra-surveyor_remove.jar 2
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く