{"uuid": "788efa63-2041-47a7-94a9-da8d09a25ad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-8651", "type": "exploited", "source": "https://t.me/information_security_channel/4520", "content": "Anatomy of Flash Exploit (CVE-2015-8651) integrated into Rig Exploit Kit\nhttp://blogs.quickheal.com/anatomy-flash-exploit-cve-2015-8651-integrated-rig-exploit-kit/\n\nWe all know how the infamous RIG Exploit Kit have been used to infect the end users. We are seeing a constant spike in the usage of the RIG Exploit Kit by malware actors to spread malware. Its use has been noticed in different campaigns such as EITest, pseudoDarkleech, and...\nThe post Anatomy of Flash Exploit (CVE-2015-8651) integrated into Rig Exploit Kit (http://blogs.quickheal.com/anatomy-flash-exploit-cve-2015-8651-integrated-rig-exploit-kit/) appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice (http://blogs.quickheal.com/).", "creation_timestamp": "2017-04-25T11:23:21.000000Z"}