Post Profile

New Adobe Flash critical vulnerability is being exploited in the wild

A newly discovered critical vulnerability in Adobe System Inc.’s Flash player is being actively exploited by possibly North Korean hackers. The zero-day vulnerability (CVE-2018-4878) exists in recent versions of Flash up to and gives an attacker Remote Code Execution access that allows them to take control of the affected system. The attack vector involves a phishing […] The post New Adobe Flash critical vulnerability is being exploited in the wild appeared first on SiliconANGLE.
read more


Related Posts

Inside Adobe Reader Zero-Day Exploit CVE 2011-2462

Technology / Security : McAfee Avert Labs

Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader 9.4.6 and Reader 9.x Versions for Unix. This zero-day vulnerability (CVE-2011-246...

Hackers exploiting Flash Player XSS vulnerability

Technology / Security : Zero Day

Adobe releases a Flash Player update in response to reports that a cross-site scripting vulnerability is being exploited in the wild in active targeted attacks.

Adobe addresses new 'actively exploited' critical vulnerability in Flash, users urged to update

Technology / Apple : Apple Insider

Yet another severe flaw in Adobe's much-maligned Flash Player has been discovered and is being "actively exploited," the company said on Tuesday, and users with Flash installed are being urged to upgrade to the latest version as soo...

Adobe identifies major Flash Player vulnerability, says exploit being used in real-world attacks

Technology / Apple : Apple Insider

Adobe has discovered a "critical" vulnerability affecting many recent versions of Flash Player, according to a new security bulletin, which warns that the exploit is already in use by hackers.

Adobe Issues Emergency Patch To Fix Flash Vulnerabilities

Technology : The Inquisitr - Tech

Adobe has issued an emergency patch for its Flash Player that will address a number of serious vulnerabilities. The company explained there are three vulnerabilities that are currently being exploited by hackers to attack systems us...


Copyright © 2016 Regator, LLC