McAfee warned that attackers could booby-trap websites with the exploit code and "silently" compromise vulnerable PCs.
"Exploit code has been publicly posted and used to successfully attack fully-patched Windows XP SP2 systems, " said Cert.
One bug being patched is found in Microsoft's PowerPoint presentation software and an exploit code is known to be circulating online.
Security firms said code to exploit the loopholes had been recently added to the popular Blackhole crimeware kit.
With his minimalist stroke and robotic discipline, he was like a video-game player who had found a loophole in the programming code to exploit.
Code to exploit the bug has already been published though Microsoft said it had no evidence it was currently being used by hi-tech criminals.
Microsoft said it had decided to issue a patch early because attacks using the vulnerability had increased in intensity and code to exploit the flaw was known to be circulating widely.
Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive.
Of course there are separate and powerful arguments for letting people who know how to invest wisely keep what they make so they can make more good investments, but Americans for Tax Reform does not exist to help rich people exploit a byzantine tax code.
FORBES: How Much Of A Stretch Is It For John Kerry To Pin Supercommittee Fail On Grover Norquist?
Malicious hackers wanting to try to identify and exploit flaws in the code in order to blackmail the company are another possibility. (Some reports said the attack originated in St Petersburg, and suggested that the Russian mafia may have been involved.) And there is always the chance that some 15-year-old whizz-kid did it all for fun or to impress his friends.
There were schemes designed to exploit weaknesses in the tax code.
FORBES: Dow Chemical's $1 Billion Tax Shelter Stinks, Says Court
Blaster was designed to exploit a known loophole in Microsoft's code that allows the worm to spread through network connections, rather than e-mail.
Exploit Hub will allow any researcher to submit hacking code to the marketplace and name his or her price.
FORBES: Research Firm NSS Will Launch 'Exploit Hub,' An App Store For Hackers
The next step is to attack the code using tools also available on the Internet that exploit the known vulnerabilities in that particular software.
Hi-tech criminals have long known that they can exploit IE's memory management to inject their own malicious code into the stream of instructions a computer processes as a browser is being used.
Lately, the search giant has also applied its moral code to real evildoers: Web sites that use shady software to exploit unwitting searchers.
Bad software leads to security vulnerabilities that vandals and thieves exploit, and wastes hours of productive time as techies desperately fix bugs in the code.
应用推荐