{"id":35932,"date":"2015-01-22T13:16:02","date_gmt":"2015-01-22T21:16:02","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=35932"},"modified":"2017-01-06T15:58:04","modified_gmt":"2017-01-06T23:58:04","slug":"flash-player-0day-vulnerability-jolts-rushed-update","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/","title":{"rendered":"Flash Player 0-Day Vulnerability Jolts Rushed Update"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\"><img loading=\"lazy\" class=\" wp-image-10591 alignright\" style=\"border: 1px solid black;\" title=\"Adobe Patches Angler Exploit Kit Flash Player Vulnerability\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\" alt=\"adobe-patched-header\" width=\"185\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg 325w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-150x101.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-300x203.jpg 300w\" sizes=\"(max-width: 185px) 100vw, 185px\" \/><\/a>Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an attack tool called the Angler Exploit Kit. These updates are available for Mac, Windows and Linux, and address a security hole that \u201ccould be used to circumvent memory randomization mitigations on the Windows platform,\u201d according to Adobe\u2019s security bulletin (<a href=\"http:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb15-02.html\">APSB15-02<\/a>).<\/p>\n<p>Affected software versions: Adobe Flash Player 16.0.0.257 and earlier versions, Adobe Flash Player 13.0.0.260 and earlier 13.x versions, and Adobe Flash Player 11.2.202.429 and earlier versions for Linux.<\/p>\n<p>On Adobe&#8217;s\u00a0blog, the company\u00a0offered the following <a title=\"Link to Adobe Blog\" href=\"http:\/\/blogs.adobe.com\/psirt\/?p=1157\" target=\"_blank\">warning <\/a>to Flash Player users:<\/p>\n<blockquote><p>Adobe is aware of reports that an exploit for CVE-2015-0310 exists in the wild, which is being used in attacks against older versions of Flash Player. Additionally, we are investigating reports that a separate exploit for Flash Player 16.0.0.287 and earlier also exists in the wild.<\/p><\/blockquote>\n<p>Adobe described the\u00a0vulnerability patched in this update as follows:<\/p>\n<blockquote><p>These updates resolve a memory leak that could be used to circumvent memory address randomization on the Windows platform (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0310\">CVE-2015-0310<\/a>).<\/p><\/blockquote>\n<p>French security researcher, Kafeine,\u00a0<a title=\"Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK\" href=\"http:\/\/malware.dontneedcoffee.com\/2015\/01\/unpatched-vulnerability-0day-in-flash.html\" target=\"_blank\">spotted<\/a>\u00a0the new\u00a0variant of the Angler EK, which\u00a0is exploiting three different vulnerabilities in Flash Player, including the 0-day flaw affecting\u00a0Adobe Flash version 16.0.0.257. Adobe is investigating these reports, and we can therefore expect additional\u00a0security updates to follow. Consequently, as Kafeine said, &#8220;Disabling Flash Player for some days might be a good idea.&#8221;<\/p>\n<p><strong>MORE:\u00a0<a title=\"How to Tell if Adobe Flash Player Update is Valid\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">How to Tell if Adobe Flash Player Update is Valid<\/a><\/strong><\/p>\n<p>Exploit kits such as Angler EK are based on a &#8220;drive-by download attack&#8221; delivery technique, and\u00a0installation starts silently in the background simply by visiting a website.<\/p>\n<p>In the meantime, users of Adobe Flash Player desktop runtime for Mac and Windows should <a title=\"Get Adobe Flash Player\" href=\"http:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">update to Adobe Flash Player 16.0.0.287<\/a> (14.9 MB)\u2014just be aware that Adobe is still investigating reports that a separate exploit for Flash Player 16.0.0.287 still exists in the wild. It&#8217;s therefore a good idea to have up to date <strong><a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac anti-virus<\/a><\/strong> software to detect known malware variants. Intego VirusBarrier recognizes this threat as <strong>Flash\/AnglerEK<\/strong>.<\/p>\n<p>Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.262. Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.438. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 16.0.0.287.<\/p>\n<div>\n<hr>\n<div>\n<p><strong>January 23 Update<\/strong>: Adobe published a security advisory\u00a0(<a title=\"APSA15-01\" href=\"http:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsa15-01.html\" target=\"_blank\">APSA15-01<\/a>) on the remaining\u00a0exploit for\u00a0Adobe Flash Player 16.0.0.287:<\/p>\n<\/div>\n<\/div>\n<blockquote><p>A critical vulnerability (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0311\" target=\"_blank\">CVE-2015-0311<\/a>) exists in\u00a0Adobe Flash Player 16.0.0.287\u00a0and earlier versions for Windows, Macintosh and Linux.\u00a0 Successful exploitation could cause a crash and potentially allow an attacker to take control of the affected system.\u00a0\u00a0We are aware of reports that\u00a0this vulnerability is being actively exploited\u00a0in the wild\u00a0via drive-by-download attacks\u00a0against\u00a0systems running Internet Explorer and Firefox on Windows\u00a08 and below.<\/p><\/blockquote>\n<p>Adobe said they expect to have a patch available for\u00a0CVE-2015-0311\u00a0during the week of January 26.\u00a0Adobe\u00a0software affected by the\u00a0vulnerability that is being actively exploited\u00a0in the wild includes the following Flash Player versions: Adobe Flash Player 16.0.0.287 and earlier versions for Mac and Windows, Adobe Flash Player 13.0.0.262 and earlier 13.x versions, and Adobe Flash Player 11.2.202.438 and earlier versions for Linux.<\/p>\n<p><strong>January 24 Update<\/strong>: Adobe has released <a title=\"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/\" target=\"_blank\">Flash Player version 16.0.0.296<\/a> with a fix for the second 0-day vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an attack tool called the Angler Exploit Kit. These updates are available for Mac, Windows and Linux, and address a security hole that \u201ccould be used to circumvent memory randomization mitigations [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,979,1864,1861,1858,1873,52,182,1870,144,701],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flash Player 0-Day Vulnerability Jolts Rushed Update - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-22T21:16:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:58:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/\",\"name\":\"Flash Player 0-Day Vulnerability Jolts Rushed Update - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#primaryimage\"},\"datePublished\":\"2015-01-22T21:16:02+00:00\",\"dateModified\":\"2017-01-06T23:58:04+00:00\",\"description\":\"Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flash Player 0-Day Vulnerability Jolts Rushed Update\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Flash Player 0-Day Vulnerability Jolts Rushed Update\",\"datePublished\":\"2015-01-22T21:16:02+00:00\",\"dateModified\":\"2017-01-06T23:58:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#webpage\"},\"wordCount\":564,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe\",\"Adobe Flash\",\"Angler EK\",\"Angler Exploit Kit\",\"CVE-2015-0310\",\"CVE-2015-0311\",\"Exploit\",\"Flash Player\",\"Flash\/AnglerEK\",\"Vulnerability\",\"Zero-Day Vulnerability\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/","og_locale":"en_US","og_type":"article","og_title":"Flash Player 0-Day Vulnerability Jolts Rushed Update - The Mac Security Blog","og_description":"Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-01-22T21:16:02+00:00","article_modified_time":"2017-01-06T23:58:04+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/","name":"Flash Player 0-Day Vulnerability Jolts Rushed Update - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#primaryimage"},"datePublished":"2015-01-22T21:16:02+00:00","dateModified":"2017-01-06T23:58:04+00:00","description":"Adobe Systems has released updates to its Flash Player software to correct a 0-day vulnerability (CVE-2015-0310) that is being exploited in the wild by an","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flash Player 0-Day Vulnerability Jolts Rushed Update"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Flash Player 0-Day Vulnerability Jolts Rushed Update","datePublished":"2015-01-22T21:16:02+00:00","dateModified":"2017-01-06T23:58:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#webpage"},"wordCount":564,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe","Adobe Flash","Angler EK","Angler Exploit Kit","CVE-2015-0310","CVE-2015-0311","Exploit","Flash Player","Flash\/AnglerEK","Vulnerability","Zero-Day Vulnerability"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9ly","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35932"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=35932"}],"version-history":[{"count":17,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35932\/revisions"}],"predecessor-version":[{"id":61084,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35932\/revisions\/61084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=35932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=35932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=35932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}