Nytro Posted May 23, 2013 Report Posted May 23, 2013 [h=1]Pwn2Own 2013 Java Exploit Details[/h][h=2]In March 2013, during the annual Pwn2Own competition at CanSecWest, Accuvant LABS’ Joshua J. Drake demonstrated a successful attack against Oracle’s Java Runtime Environment (JRE). The demonstration proved exploiting memory corruption vulnerabilities in Oracle’s JRE 7 is still possible despite modern exploit mitigations. Accuvant LABS’ exploit code, as well as a white paper containing detailed information about the vulnerabilities, primitives and exploitation techniques, is available for download below.[/h]Download:https://www.accuvant.com/sites/default/files/downloads/pwn2own_2013_-_java_7_se_memory_corruption.pdfData:https://www.accuvant.com/sites/default/files/downloads/pwn2own2013-jre7.zipSursa: http://www.accuvant.com/capability/accuvant-labs/security-research/pwn2own-2013-java-exploit-details Quote