![]() ![]() Earlier this year, attackers started exploiting a Flash Player vulnerability just one week after Adobe released a patch for it. However, history has shown that attackers are quick to target new Flash flaws after a fix becomes available for them. These are the kind of vulnerabilities used in drive-by download attacks launched through compromised websites or malicious ads to install malware on users’ computers.Īdobe is not aware that any of the newly-patched vulnerabilities are being actively exploited by attackers. Six of the new vulnerabilities patched in Flash Player could be exploited to achieve remote code execution. Adobe also released updates for the AIR runtime on Windows, Mac and Android, as well AIR SDK and Compiler, because these programs bundle Flash Player.
0 Comments
Leave a Reply. |