Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Adobe Investigating New Flash Zero-Day Spotted In Crimeware Kit
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
1/22/2015 | 2:28:35 PM
Re: Adobe patch available 22Jan1025
Thanks, @Jon. I was about to post an update here about the patch. http://blogs.adobe.com/psirt/?p=1157

And here's Adobe's comment on the other possible 0day:

"Additionally, we are investigating a report that a separate exploit for Flash Player 16.0.0.287 and earlier versions also exists in the wild. Please continue to monitor this blog for updates."
Jon M. Kelley
50%
50%
Jon M. Kelley,
User Rank: Moderator
1/22/2015 | 1:23:29 PM
Adobe patch available 22Jan1025
A week after the last Adobe Flash patch set, today 22Jan2015, Abobe released Flash patch sets for the new Flash Zero-Day, reported by Kafeine (& later confirmed by Malwarebytes) on 20Jan2015. The patch sets updated the Flash gereral release from 16.0.0.257 to 16.0.0.287, and Flash Extended Support Release [ESR] release from 13.0.0.260 to 13.0.0.262.


Adobe documentation for the update is, in general, not up to date as yet.  For example the corresponding the critiacl vulnerabilities "Security Bulletin APSB 15-02" has not been posted as of noon today.


Google Chrome was updated yesterday, but today a Google search for "13.0.0.262" returns "did not match any documents...", with DuckDuckGO search engine returning only one hit from a German "com-magazin" site.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-43783
PUBLISHED: 2021-11-29
@backstage/plugin-scaffolder-backend is the backend for the default Backstage software templates. In affected versions a malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend ho...
CVE-2021-43786
PUBLISHED: 2021-11-29
Nodebb is an open source Node.js based forum software. In affected versions incorrect logic present in the token verification step unintentionally allowed master token access to the API. The vulnerability has been patch as of v1.18.5. Users are advised to upgrade as soon as possible.
CVE-2021-43787
PUBLISHED: 2021-11-29
Nodebb is an open source Node.js based forum software. In affected versions a prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path...
CVE-2021-43788
PUBLISHED: 2021-11-29
Nodebb is an open source Node.js based forum software. Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possib...
CVE-2021-34800
PUBLISHED: 2021-11-29
Sensitive information could be logged. The following products are affected: Acronis Agent (Windows, Linux, macOS) before build 27147