12-06-2018 05:36 AM - edited 03-12-2019 07:09 AM
It's day two of the adobe zero day with a exploit code in the wild.
CVE-2018-15982 is yet to be discussed at Cisco Talos, and:
For that matter the suspect C2 IP isn't even published, thus our FTD identifies the address as still: "Risk Unknown".
But I'm pleased to see the "Beers with Talos" uselessly overpowering web page real-estate.
Not a single discussion as of yet regarding CVE-2018-15982 zero day.
What are the subscriptions to Cisco Threat Intelligence for?
Solved! Go to Solution.
12-07-2018 11:02 AM
Below are the SID's that cover CVE-2018-15982. gid sid rev msg ======================================================================= 1 48496 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48495 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48494 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48493 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48492 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48491 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
12-07-2018 11:02 AM
Below are the SID's that cover CVE-2018-15982. gid sid rev msg ======================================================================= 1 48496 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48495 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48494 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48493 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48492 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt 1 48491 1 FILE-FLASH Adobe Flash Player TVSDK metadata use after free attempt
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide