	{"id":13463,"date":"2013-04-09T12:32:34","date_gmt":"2013-04-09T19:32:34","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=13463"},"modified":"2016-10-06T12:30:46","modified_gmt":"2016-10-06T19:30:46","slug":"adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/","title":{"rendered":"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-adobe-vulnerabilities-attacked-in-the-wild-now-patched\/adobe-patched\/\" rel=\"attachment wp-att-10593\"><img loading=\"lazy\" class=\"alignright  wp-image-10593\" style=\"border: 1px solid black;\" title=\"adobe-patched\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched.jpg\" alt=\"\" width=\"243\" height=\"160\" \/><\/a>Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in the software products. The 17.1 MB update to Adobe Flash Player 11.7.700.169 is available for download and resolves four critical vulnerabilities \u201cthat could cause a crash and potentially allow an attacker to take control of the affected system,\u201d Adobe said in a <a href=\"http:\/\/www.adobe.com\/support\/security\/bulletins\/apsb13-11.html\" target=\"_blank\">security advisory<\/a>.<\/p>\n<p>The newly released Flash Player versions are: Flash Player 11.7.700.169 for Windows and Mac, and Flash Player 11.2.202.280 for Linux.<\/p>\n<p>The following details describe the four flaws resolved in the Adobe Flash Player update:<\/p>\n<ul>\n<li>These updates resolve an integer overflow vulnerability that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2555\" target=\"_blank\">CVE-2013-2555<\/a>).<\/li>\n<li>These updates resolve memory corruption vulnerabilities that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1378\" target=\"_blank\">CVE-2013-1378<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1380\" target=\"_blank\">CVE-2013-1380<\/a>).<\/li>\n<li>These updates resolve a memory corruption vulnerability caused by Flash Player improperly initializing certain pointer arrays, which could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1379\" target=\"_blank\">CVE-2013-1379<\/a>).<\/li>\n<\/ul>\n<p>Adobe also released <a href=\"http:\/\/www.adobe.com\/support\/security\/bulletins\/apsb13-12.html\" target=\"_blank\">updates<\/a> for Windows and Macintosh supported editions of Adobe Shockwave Player and offered a <a href=\"http:\/\/www.adobe.com\/support\/security\/bulletins\/apsb13-10.html\" target=\"_blank\">hotfix<\/a> for ColdFusion in order to fix six vulnerabilities found in the products. The company also released version 3.7.0.1530 of its Adobe AIR Internet application runtime system, because the software includes Flash Player and was subject to the same vulnerabilities.<\/p>\n<p>Following are details that describe the combined six flaws resolved in the Shockwave Player and ColdFusion updates:<\/p>\n<ul>\n<li>This update resolves a buffer overflow vulnerability that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1383\" target=\"_blank\">CVE-2013-1383<\/a>).<\/li>\n<li>This update resolves memory corruption vulnerabilities that could lead to code execution (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1384\" target=\"_blank\">CVE-2013-1384<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1386\" target=\"_blank\">CVE-2013-1386<\/a>).<\/li>\n<li>This update resolves a memory leakage vulnerability that could be exploited to reduce the effectiveness of address space randomization (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1385\" target=\"_blank\">CVE-2013-1385<\/a>).<\/li>\n<li>This hotfix resolves a vulnerability that could be exploited to impersonate an authenticated user (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1387\" target=\"_blank\">CVE-2013-1387<\/a>).<\/li>\n<li>This hotfix resolves a vulnerability that could be exploited by an unauthorized user to gain access to the ColdFusion administrator console (<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1388\" target=\"_blank\">CVE-2013-1388<\/a>)<em>.<\/em><em>\u00a0<\/em><\/li>\n<\/ul>\n<p>Users of Adobe Flash Player 11.6.602.180 and earlier versions for Mac OS X should update to <a href=\"http:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">Adobe Flash Player 11.7.700.169<\/a> as soon as possible. The Flash Player plug-ins that come bundled with Google Chrome will automatically be updated by Google through their respective update mechanisms, which will include Adobe Flash Player 11.7.700.179 for Windows and 11.7.700.169 for Macintosh and Linux. Users of Adobe AIR 3.6.0.6090 and earlier versions should install the 26.2 MB update to <a href=\"http:\/\/get.adobe.com\/air\/\" target=\"_blank\">Adobe AIR 3.7<\/a> (Macintosh).<\/p>\n<p>Users of Adobe Shockwave Player 12.0.0.112 and earlier versions for Mac and Windows should install the 13 MB update to the new <a href=\"http:\/\/get.adobe.com\/shockwave\/\" target=\"_blank\">Shockwave 12.0.2.122<\/a>. Lastly, Adobe recommends ColdFusion customers update their installations using the instructions provided <a href=\"http:\/\/helpx.adobe.com\/coldfusion\/kb\/coldfusion-security-hotfix-apsb13-10.html\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in the software products. The 17.1 MB update to Adobe Flash Player 11.7.700.169 is available for download and resolves four critical vulnerabilities \u201cthat could cause a crash and potentially allow an attacker [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[186,184],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-09T19:32:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:30:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/\",\"name\":\"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#primaryimage\"},\"datePublished\":\"2013-04-09T19:32:34+00:00\",\"dateModified\":\"2016-10-06T19:30:46+00:00\",\"description\":\"Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion\",\"datePublished\":\"2013-04-09T19:32:34+00:00\",\"dateModified\":\"2016-10-06T19:30:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#webpage\"},\"wordCount\":433,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe Flash Player\",\"Adobe Shockwave Player\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/","og_locale":"en_US","og_type":"article","og_title":"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion - The Mac Security Blog","og_description":"Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-04-09T19:32:34+00:00","article_modified_time":"2016-10-06T19:30:46+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/","name":"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#primaryimage"},"datePublished":"2013-04-09T19:32:34+00:00","dateModified":"2016-10-06T19:30:46+00:00","description":"Adobe Systems has released new versions of Flash Player, Shockwave Player, and ColdFusion in order to address a total of 10 critical vulnerabilities in","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe Patches 10 Critical Vulnerabilities in Flash Player, Shockwave Player, and ColdFusion","datePublished":"2013-04-09T19:32:34+00:00","dateModified":"2016-10-06T19:30:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#webpage"},"wordCount":433,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe Flash Player","Adobe Shockwave Player"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-10-critical-vulnerabilities-in-flash-player-shockwave-player-and-coldfusion\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3v9","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13463"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=13463"}],"version-history":[{"count":25,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13463\/revisions"}],"predecessor-version":[{"id":13517,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13463\/revisions\/13517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=13463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=13463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=13463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}