![]() Technical Analysis of the Exploit and Payload According to a testing done by Metasploit, the vulnerability also runs on Google Chrome and Safari. ![]() ![]() The zero-day exploit successfully runs in all versions of Internet Explorer, Firefox and Opera. Successful exploit leads to the download of a backdoor, in effect allowing remote malicious users to execute their desired commands on the vulnerable system. An unpatched JRE 1.7/Java 7 zero-day vulnerability (CVE-2012-4681) was recently found to be exploited by a malicious.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |