A recent leak of internal documents from gray-hat software developer Hacking Team has revealed another zero-day vulnerability in the Flash plugin. As Ars Technica reports, the vulnerability has been verified by anti-virus maker Symantec and is known to affect Internet Explorer, though Symantec believes it can affect Flash in other browsers, as well. If exploited, this vulnerability could allow an attacker to remotely execute code on a targed machine.
In Symantec's blog post on the topic, the company warns, "Given the source of the proof-of-concept code, it is possible that this vulnerability has already been exploited in the wild. Following its disclosure, it can be expected that groups of attackers will rush to incorporate it into exploit kits before a patch is published by Adobe." Ars says Adobe is aware of this vulnerability and plans to issue a patch on Wednesday. In the meantime, we concur with their advice to disable Flash if possible.
|Asus GTX 1080 and 1060 cards with faster RAM go the extra mile||1|
|Thermaltake's View 28 case can light up any room||8|
|Samsung unboxes Galaxy S8 and S8+ handsets and accessories||18|
|Aorus GA-AX370 Gaming K5 mobo trims a little fat||6|
|Windows 10 Creators Update set to hit PCs on April 11||14|
|SiSoft Sandra Platinum 2017 is ready for Ryzen||1|
|SteelSeries' Rival 700 gaming mouse reviewed||6|
|Intel lets loose Kaby Lake-based Xeon E3 v6 processors||56|
|Samsung plans to refurbish and resell Galaxy Note 7 handsets||21|