Microsoft found the threat actor exploiting the bug two days before Google released a patch.
The multilingual plugin is hit with a critical bug that can allow complete site compromise through remote code execution.
The vulnerability that was fixed in an update released last week has found fresh exploitations in the wild.
Attackers can use publicly exposed federation metadata to fake SAML responses and gain admin privileges.
The security flaw could allow attackers to access vulnerable web helpdesk instances without authentication.
After reviewing customer reactions to stories of a potential buyout, Action1 decided it had the potential to stay independent and deliver more.
The true determinant of success will be how well each side harnesses this powerful tool to outmaneuver the other in the ongoing cybersecurity arms race.
Both the vulnerabilities score above 9 on CVSS and can allow access to sensitive data if not patched immediately.