Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Tech Insight: 5 Approaches To Decaffeinating Java Exploits
Newest First  |  Oldest First  |  Threaded View
CHV4L
50%
50%
CHV4L,
User Rank: Apprentice
1/29/2013 | 6:51:30 PM
re: Tech Insight: 5 Approaches To Decaffeinating Java Exploits
so, ive blocked them and i feel better.

Am I correct in the fact that all java exploits will come via downlaoded jar or class files?
CHV4L
50%
50%
CHV4L,
User Rank: Apprentice
1/24/2013 | 10:03:39 PM
re: Tech Insight: 5 Approaches To Decaffeinating Java Exploits
ive been monitoring all the jar and class files flowing from the internet into our network. There are not many at all. Next week I will block all jar file and class files from the internet.
Andrew Binstock
50%
50%
Andrew Binstock,
User Rank: Apprentice
1/23/2013 | 3:51:19 AM
re: Tech Insight: 5 Approaches To Decaffeinating Java Exploits
For most organizations, #4 is the option that makes the most sense.
kjhiggins
50%
50%
kjhiggins,
User Rank: Strategist
1/23/2013 | 12:33:37 AM
re: Tech Insight: 5 Approaches To Decaffeinating Java Exploits
Wonder how many orgs are stuck with Java due to having apps that require it for financial,
reporting, and other biz solutions...

Kelly Jackson Higgins, Senior Editor
Dark Reading


How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17607
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
CVE-2019-17608
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbname parameter.
CVE-2019-17609
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.
CVE-2019-17610
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbpassword parameter.
CVE-2019-17611
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php tableprefix parameter.