Apple is investigating the vulnerability used by jailbreakme.com, all vulnerable terminals!

An Apple spokesperson a declared yesterday, the company is investigating the vulnerability used by comex in the payload for the new jailbreak. As you already know very well, the jailbreak is implemented through a vulnerability discovered by comex in the Adobe code for running PDF files, so that a simple opening of the PDF file with the jailbreak code leads to the jailbreak of the device. Unfortunately, all users are vulnerable to this exploit, even those who have not jailbroken, even those who still have iOS 3.x installed in their terminals. However, those who have a jailbroken phone can defend themselves against the actions of malicious people by installing a patch called uni PDF Loading Warner, which warns the user if there is any attempt to exploit the iOS vulnerability.

This vulnerability is very dangerous and Apple is now trying to fix it, so it is very possible that in the near future there will be a new update for iOS that will block the jailbreak solution released by comex a few days ago. At the moment a jailbroken phone with PDF Loading Warner installed is much more secure than a non-jailbroken phone without this patch, so my advice is to jailbreak and install that patch to be protected, at least until Apple releases a new one update.