Main

related bits

0

processing priority

4

site type

3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)

review version

11

html import

20 (imported)

Thumbnail
yomuds.blogspot.com
Events

first seen date

2025-03-18 22:10:23

expired found date

-

created at

2025-03-18 22:10:23

updated at

2026-02-03 22:12:14

Domain name statistics

length

19

crc

52525

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

69893241 (blogspot.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

133363

mp size raw text

30847

mp inner links count

33

mp inner links status

20 (imported)

Open Graph

title

a bunch of random security bits!

description

image

site name

author

updated

2026-02-02 17:29:16

raw text

a bunch of random security bits! a bunch of random security bits! Friday, November 30, 2012 Flash exploit (CVE-2011-2110) and Cool Exploit Kit The Cool Exploit kit is using two flash vulnerabilities for the exploits. In this particular post, The vulnerability for CVE-2011-2110 will be analyzed. The post will highlight on analyzing the attack using flash exploit instead of detail on the vulnerability of CVE-2011-2110. ARTeam has a great writeup explaining on CVE-2011-2110  here . For this blogpost, the focus start is still the index page of Cool Exploit Kit The JavaScript retrieved from index page is as below //JS code from Index's page. Only relavent code associated with Flash attack will be //showed //.... function ShowPDF() { var pdf = (PluginDetect.getVersion("AdobeReader") + ".").toString().split("."); var vver = ""; if (pdf[0] < 8) { vver = "old"; setTimeout("FlashExploit()", 8003...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

21704

text words

4373

text unique words

1115

text lines

571

text sentences

216

text paragraphs

57

text words per sentence

20

text matched phrases

39

text matched dictionaries

8

RSS

rss status

32 (unknown)

rss found date

2025-03-18 22:10:25

rss size orig

183937

rss items

25

rss spam phrases

0

rss detected language

1 (English)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

40 (completed successful import of reports.txt file to table in_pages)

sitemap review version

2

sitemap urls count

25

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2025-03-18 22:10:25

sitemap process date

2025-03-23 03:01:16

sitemap first import date

-

sitemap last import date

2025-06-25 09:35:39