{"id":10675,"date":"2013-02-13T12:55:56","date_gmt":"2013-02-13T20:55:56","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10675"},"modified":"2013-02-13T12:55:56","modified_gmt":"2013-02-13T20:55:56","slug":"adobe-patches-critical-flaws-in-flash-and-shockwave","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/","title":{"rendered":"Adobe Patches Critical Flaws in Flash and Shockwave"},"content":{"rendered":"<p>In two separate security <a href=\"http:\/\/www.adobe.com\/support\/security\/\" target=\"_blank\">updates<\/a>, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both software updates address critical vulnerabilities and Adobe recommends users update their product installations to the latest versions.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-10593\" style=\"border: 1px solid black;\" title=\"adobe-patched\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-150x97.jpg\" alt=\"\" width=\"150\" height=\"97\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-150x97.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-300x195.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-305x200.jpg 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched.jpg 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>The security issues addressed in Adobe Flash Player 11.5.502.149 and earlier versions affect all operating systems, resolving flaws that could cause a crash and potentially allow an attacker to take control of the affected system. Security updates for Adobe Shockwave Player 11.6.8.638 and earlier versions fix flaws that affect the Macintosh and Windows platforms, \u201c[addressing] vulnerabilities that could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system,\u201d the company <a href=\"http:\/\/www.adobe.com\/support\/security\/bulletins\/apsb13-06.html\" target=\"_blank\">said<\/a>.<\/p>\n<p>Adobe\u2019s Flash Player update fixes a combined 17 flaws (CVEs), as indicated below:<\/p>\n<blockquote>\n<ul>\n<li>This update resolves buffer overflow vulnerabilities that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1372\" target=\"_blank\">CVE-2013-1372<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0645\" target=\"_blank\">CVE-2013-0645<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1373\" target=\"_blank\">CVE-2013-1373<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1369\" target=\"_blank\">CVE-2013-1369<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1370\" target=\"_blank\">CVE-2013-1370<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1366\" target=\"_blank\">CVE-2013-1366<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1365\" target=\"_blank\">CVE-2013-1365<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1368\" target=\"_blank\">CVE-2013-1368<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0642\" target=\"_blank\">CVE-2013-0642<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1367\" target=\"_blank\">CVE-2013-1367<\/a>).<\/li>\n<li>This update resolves use-after-free vulnerabilities that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0649\" target=\"_blank\">CVE-2013-0649<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1374\" target=\"_blank\">CVE-2013-1374<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0644\" target=\"_blank\">CVE-2013-0644<\/a>).<\/li>\n<li>This update resolves an integer overflow vulnerability that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0639\" target=\"_blank\">CVE-2013-0639<\/a>).<\/li>\n<li>This update resolves memory corruption vulnerabilities that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0638\" target=\"_blank\">CVE-2013-0638<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0647\" target=\"_blank\">CVE-2013-0647<\/a>).<\/li>\n<li>This update resolves a vulnerability that could result in information disclosure (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0637\" target=\"_blank\">CVE-2013-0637<\/a>).<\/li>\n<\/ul>\n<\/blockquote>\n<p>The software update for Adobe Shockwave Player fixes two flaws, described in more detail below:<\/p>\n<blockquote>\n<ul>\n<li>This update resolves a memory corruption vulnerability that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0635\" target=\"_blank\">CVE-2013-0635<\/a>).<\/li>\n<li>This update resolves a stack overflow vulnerability that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0636\" target=\"_blank\">CVE-2013-0636<\/a>).<\/li>\n<\/ul>\n<\/blockquote>\n<p>Users of Adobe Flash Player 11.5.502.149 and earlier versions for Mac OS X should download the 16.15 MB update to <a href=\"http:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">Adobe Flash Player 11.6.602.167<\/a> as soon as possible. Flash Player installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 11.6.602.167 for Mac, Linux, and Windows platforms. Users of Adobe AIR 3.5.0.1060 and earlier versions for Mac should download the 26.6 MB update to <a href=\"http:\/\/get.adobe.com\/air\/\" target=\"_blank\">Adobe AIR 3.6<\/a> (version 3.6.0.597). Lastly, users of Adobe Shockwave Player 11.6.8.638 and earlier versions for Mac and Windows should download the 12.9 MB update to the newest <a href=\"http:\/\/get.adobe.com\/shockwave\/\" target=\"_blank\">Shockwave Player version 12.0.0.112<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In two separate security updates, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both software updates address critical vulnerabilities and Adobe recommends users update their product installations to the latest versions. The security issues addressed in Adobe Flash Player 11.5.502.149 and earlier versions affect all operating [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[186,184,201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In two separate security updates, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Patches Critical Flaws in Flash and Shockwave - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In two separate security updates, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-13T20:55:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/\",\"name\":\"Adobe Patches Critical Flaws in Flash and Shockwave - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#primaryimage\"},\"datePublished\":\"2013-02-13T20:55:56+00:00\",\"dateModified\":\"2013-02-13T20:55:56+00:00\",\"description\":\"In two separate security updates, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Patches Critical Flaws in Flash and Shockwave\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe Patches Critical Flaws in Flash and Shockwave\",\"datePublished\":\"2013-02-13T20:55:56+00:00\",\"dateModified\":\"2013-02-13T20:55:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#webpage\"},\"wordCount\":369,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe Flash Player\",\"Adobe Shockwave Player\",\"Security Updates\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In two separate security updates, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/","og_locale":"en_US","og_type":"article","og_title":"Adobe Patches Critical Flaws in Flash and Shockwave - The Mac Security Blog","og_description":"In two separate security updates, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-02-13T20:55:56+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/","name":"Adobe Patches Critical Flaws in Flash and Shockwave - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#primaryimage"},"datePublished":"2013-02-13T20:55:56+00:00","dateModified":"2013-02-13T20:55:56+00:00","description":"In two separate security updates, Adobe released new versions of its Flash Player and Shockwave Player to address vulnerabilities in the software. Both","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe Patches Critical Flaws in Flash and Shockwave"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe Patches Critical Flaws in Flash and Shockwave","datePublished":"2013-02-13T20:55:56+00:00","dateModified":"2013-02-13T20:55:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#webpage"},"wordCount":369,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe Flash Player","Adobe Shockwave Player","Security Updates"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-critical-flaws-in-flash-and-shockwave\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2Mb","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10675"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10675"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10675\/revisions"}],"predecessor-version":[{"id":10711,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10675\/revisions\/10711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}