<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The hunt is on - 0day for java 1.7u10 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25994#M18954</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;now I got upgrade (but I have to check many times for new updates).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jan 2013 20:46:31 GMT</pubDate>
    <dc:creator>_slv_</dc:creator>
    <dc:date>2013-01-11T20:46:31Z</dc:date>
    <item>
      <title>The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25989#M18949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How many hours/days will it take for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Wildfire customers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Regular customers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to get protected by a threat-db update regarding the latest 0day exploit for java 1.7u10 (and possible java 1.6u38) as descibed in:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html" title="http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html"&gt;Malware don't need Coffee: 0 day 1.7u10 spotted in the Wild - Disable Java Plugin NOW !&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/"&gt;http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cert.se/sarbarheter/sr/sr13-006-oracle-0-day-i-java" title="http://www.cert.se/sarbarheter/sr/sr13-006-oracle-0-day-i-java"&gt;http://www.cert.se/sarbarheter/sr/sr13-006-oracle-0-day-i-java&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 21:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25989#M18949</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-10T21:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25990#M18950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I understand it, Wildfire won't help with the Java vuln per se, but it might help with the payloads delivered by the exploit. Wildfire only works on Windows executable files, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it may be pretty hard to sig to the generic vulnerability for this. Most sigs are geared towards formatting idiosyncrasies found within a given exploit kit or even something as simple as the class file names for a specific version of the exploit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 14:47:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25990#M18950</guid>
      <dc:creator>mscox42</dc:creator>
      <dc:date>2013-01-11T14:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25991#M18951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wildfire can not help you because it can only analyze EXE or DDL file...&lt;/P&gt;&lt;P&gt;In my point of view, only APT vendors (like FireEye, Damballa, etc) can help you...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 15:36:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25991#M18951</guid>
      <dc:creator>licenselu</dc:creator>
      <dc:date>2013-01-11T15:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25992#M18952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Content version 349 was just released with the following CVEs:&lt;/P&gt;&lt;P&gt;CVE-2013-0422&lt;/P&gt;&lt;P&gt;CVE-2013-0422&lt;/P&gt;&lt;P&gt;CVE-2012-1530&lt;/P&gt;&lt;P&gt;CVE-2013-0603&lt;/P&gt;&lt;P&gt;CVE-2013-0604&lt;/P&gt;&lt;P&gt;CVE-2013-0621&lt;/P&gt;&lt;P&gt;CVE-2013-0622&lt;/P&gt;&lt;P&gt;CVE-2013-0623&lt;/P&gt;&lt;P&gt;CVE-2013-0626&lt;/P&gt;&lt;P&gt;CVE-2013-0624&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The content release is referring to Java JRE and Adobe Reader vulnerabilities, and may reference the 0-day vulnerability you mentioned, but only the first of the three sites has any of the current CVEs (and it only has one) so I can't be sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Greg Wesson&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 19:11:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25992#M18952</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-01-11T19:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25993#M18953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you confirm that you are able to download 349 at this moment?&lt;/P&gt;&lt;P&gt;I got email:&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;H3 style="margin: 10px 0px 5px; font-size: 17px; font-weight: normal;"&gt;&lt;STRONG&gt;Announcement&lt;/STRONG&gt;: &lt;BR /&gt;Now Available - Emergency Content Release 349 &lt;/H3&gt;&lt;P&gt;&lt;SPAN style="font-weight: normal; margin-bottom: 10px;"&gt;created by &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/people/panagent"&gt;panagent&lt;/A&gt; in &lt;EM&gt;Palo &lt;BR /&gt;Alto Networks Live&lt;/EM&gt; - &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/index.jspa"&gt;View the announcement&lt;/A&gt; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p1"&gt;Palo Alto Networks has issued emergency release 349 in response to"&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;But my PA-200 still reporting that 348 is latest release, also when I logged to PA support page in dynamic updates I cant find 349 relrase.&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;With regards&lt;/P&gt;&lt;P class="p1"&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 20:24:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25993#M18953</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-01-11T20:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25994#M18954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;now I got upgrade (but I have to check many times for new updates).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 20:46:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25994#M18954</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-01-11T20:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25995#M18955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;gwesson: Thanks! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bonusquestion, did PaloAlto see this coming through Wildfire?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I manually uploaded some of the .exe files found and they all got verdict malware so at least that part works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;slv: I guess we are all like vultures so all servers didnt have the file when the email was sent out? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see it in dynamic updates here at support.paloaltonetworks.com so in worst case you can always load it manually.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 22:01:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25995#M18955</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-11T22:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25996#M18956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WildFire won't test the JAR file, but it should test the dropper EXE that the JAR file attempts to download. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 06:43:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25996#M18956</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2013-01-13T06:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25997#M18957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I could be wrong but JAR,Android and Mobile apps execution could be in the roadmap for future Wildfire enhancements.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 09:59:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25997#M18957</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2013-01-14T09:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25998#M18958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Or at least they should be &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone from PA who can confirm current status regarding Wildfire?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 10:27:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25998#M18958</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-14T10:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25999#M18959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In PA-5.0 admin guide, it say "Supported file types include Win32 Portable Executable (PE) files (e.g. exe, dll, and scr)."&lt;/P&gt;&lt;P&gt;So wildfire scan is still limited to PE files..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally, &lt;/P&gt;&lt;P&gt;File types can be analyzed even if they are compressed (zip, gzip) or over SSL if decryption is enabled in the policy. &lt;/P&gt;&lt;P&gt;And supported file types that are zipped will automatically be sent to WildFire. Don't need to put zip file type in file type box.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2013 13:00:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/25999#M18959</guid>
      <dc:creator>rlee</dc:creator>
      <dc:date>2013-01-15T13:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26000#M18960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;What is the PA Content update doing for me ? I am a little confused about this set of vulnerabilities. Are there active exploits ? If so, how is PA Stopping/Blocking them ? How could I look in the logs to see specifically which machines are infected / vulnerable.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 20:47:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26000#M18960</guid>
      <dc:creator>jhickey</dc:creator>
      <dc:date>2013-02-19T20:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26001#M18961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this document should be a good start for you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Threat Prevention Deployment Tech Note&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-3094" title="https://live.paloaltonetworks.com/docs/DOC-3094"&gt;https://live.paloaltonetworks.com/docs/DOC-3094&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as a bonus:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Designing Networks with Palo Alto Networks Firewalls&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="2561" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-2561"&gt;https://live.paloaltonetworks.com/docs/DOC-2561&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Diagrams and Tested Configurations&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="2560" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-2560"&gt;https://live.paloaltonetworks.com/docs/DOC-2560&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PA content update is available in two flavours, one with only the appid db and one with appid and threats merged together (which one you use depends on if you have the threat license active or not).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The threat part is then used in the IPS and AV configurations. What you usually do is that you create a threat-profile which you then assign to the security rules you wish to get investigated. An easy example is to create a threat profile with the following configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;critical: block&lt;/P&gt;&lt;P&gt;high: block&lt;/P&gt;&lt;P&gt;medium: block&lt;/P&gt;&lt;P&gt;low: default&lt;/P&gt;&lt;P&gt;information: default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that threats classified as critical, high and medium will be blocked while threats classified as low and information will use the paloalto recommended default action for each identified threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To log the events your security rule must have logging enabled (if im not mistaken) - usually you log on session end.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 10:40:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26001#M18961</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-02-20T10:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26002#M18962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for that reply. I appreciate it. We're already blocking high and critical threats. Management here has latched onto this specific Java 0 day threat. They want to know which machines are vulnerable. The issue for me is I really dont know what to look for in the logs. Whats the name or number asscociated with this particular set of threats. It seems that every security company has a different name or pattern.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 12:54:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26002#M18962</guid>
      <dc:creator>jhickey</dc:creator>
      <dc:date>2013-02-20T12:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: The hunt is on - 0day for java 1.7u10</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26003#M18963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jhickey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can go to the following link. Here you can search the threats ( spyware, vulnerabilities, virues ) by names and there id's.&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should make it easy for you to search for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 18:55:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-hunt-is-on-0day-for-java-1-7u10/m-p/26003#M18963</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-02-20T18:55:56Z</dc:date>
    </item>
  </channel>
</rss>

