A recent leak of internal documents from gray-hat software developer Hacking Team has revealed another zero-day vulnerability in the Flash plugin. As Ars Technica reports, the vulnerability has been verified by anti-virus maker Symantec and is known to affect Internet Explorer, though Symantec believes it can affect Flash in other browsers, as well. If exploited, this vulnerability could allow an attacker to remotely execute code on a targed machine.
In Symantec's blog post on the topic, the company warns, "Given the source of the proof-of-concept code, it is possible that this vulnerability has already been exploited in the wild. Following its disclosure, it can be expected that groups of attackers will rush to incorporate it into exploit kits before a patch is published by Adobe." Ars says Adobe is aware of this vulnerability and plans to issue a patch on Wednesday. In the meantime, we concur with their advice to disable Flash if possible.
|Asus and Sapphire offer digital pickaxes to crypto-miners||17|
|Rumor: Six-core Coffee Lake CPU pops up in Geekbench||15|
|Nokia 6 comes to the US with a taste of vanilla Android||12|
|SNES Classic will fix your nostalgia blues this September||27|
|Corsair reveals its prize haul for the TR BBQ XIV||7|
|Portions of the Windows Shared Source Kit leak out||13|
|Hyper-Threading erratum rears its head in Skylake and Kaby Lake||60|
|VR180 video bridges the gap between YouTube and VR||4|
|Steam 2017 Summer Sale, part deux||19|