Security Research
Showing results for 
Search instead for 
Do you mean 

One-Third Ain't Bad

Brian_Gorenc on ‎10-16-2013 03:24 PM

Of the Oracle vulnerabilities patched yesterday, HP's Zero Day Initiative (ZDI) researchers were responsible for 33% of Java's most critical issues (CVSS = 10.0) and an additional one resolves an issue with Oracle's Middleware technology. All of the corrected Java vulnerabilities allow attackers to bypass the sandbox and execute attacker controlled code.


Several of the Java sandbox bypasses being patched utilize unsafe reflection vulnerabilities to gain code execution. Unsafe reflection vulnerabilities are one of the most popular weaknesses being used by Java malware today. HP ZDI recommends that end-users deploy these patches as soon as possible to minimize the risks being highlighted.  Remember, end-users are not the only people analyzing the patches released yesterday.  Attackers have likely begun reverse engineering the patches and writing proof-of-concepts to trigger the corrected vulnerabilities.


For more detailed information about the vulnerabilities attributed to ZDI researchers, check out our published advisory page ( Since the beginning of 2013, we have successfully disclosed 250 security advisories in widely deployed applications and high value enterprise software products.


As always, HP's Zero Day Initiative looks forward to analyzing (and purchasing) the next set of fresh Java vulnerabilities that will come into the program over the next several weeks.  

0 Kudos
About the Author


Nov 29 - Dec 1
Discover 2016 London
Learn how to thrive in a world of digital transformation at our biggest event of the year, Discover 2016 London, November 29 - December 1.
Read more
Each Month in 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all