A recent leak of internal documents from gray-hat software developer Hacking Team has revealed another zero-day vulnerability in the Flash plugin. As Ars Technica reports, the vulnerability has been verified by anti-virus maker Symantec and is known to affect Internet Explorer, though Symantec believes it can affect Flash in other browsers, as well. If exploited, this vulnerability could allow an attacker to remotely execute code on a targed machine.
In Symantec's blog post on the topic, the company warns, "Given the source of the proof-of-concept code, it is possible that this vulnerability has already been exploited in the wild. Following its disclosure, it can be expected that groups of attackers will rush to incorporate it into exploit kits before a patch is published by Adobe." Ars says Adobe is aware of this vulnerability and plans to issue a patch on Wednesday. In the meantime, we concur with their advice to disable Flash if possible.
|G.Skill's Ripjaws KM570 RGB gaming keyboard reviewed||1|
|Z270 Godlike mobo can hold a home network on its shoulders||10|
|Sapphire shows off four new GPro E-series Radeons||5|
|Acer's Predator Z35P is on the hunt for a high-end gaming rig||33|
|Fractal Design finds a new Focus on entry-level cases||11|
|Intel plans to integrate Thunderbolt into future CPUs||27|
|Cooler Master polishes the Cosmos II for a 25th Anniversary edition||9|
|Huawei opens up three new Windows 10 notebooks||11|
|Corsair Commander Pro takes charge of case fans and lighting||7|