{"id":36004,"date":"2015-01-26T11:13:05","date_gmt":"2015-01-26T19:13:05","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=36004"},"modified":"2017-01-06T15:51:45","modified_gmt":"2017-01-06T23:51:45","slug":"adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/","title":{"rendered":"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\"><img loading=\"lazy\" class=\" wp-image-10591 alignright\" style=\"border: 1px solid black;\" title=\"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\" alt=\"adobe-patched-header\" width=\"185\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg 325w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-150x101.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-300x203.jpg 300w\" sizes=\"(max-width: 185px) 100vw, 185px\" \/><\/a>Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\u00a0(CVE-2015-0311) affecting Adobe Flash Player 16.0.0.287 and earlier versions for Mac and Windows.<\/p>\n<p>Adobe previously patched one of the <a title=\"Flash Player 0-Day Vulnerability Jolts Rushed Update\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flash-player-0day-vulnerability-jolts-rushed-update\/\" target=\"_blank\">critical 0-Day vulnerabilities with an update to Flash Player 16.0.0.287<\/a>, but was still investigating reports that a separate exploit exists in the wild. Adobe estimated that they would have a new Flash Player update available during the week of January 26.<\/p>\n<p>Ahead of schedule, Adobe updated its security bulletin (<a title=\"Link to Adobe security advisory\" href=\"http:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsa15-01.html\" target=\"_blank\">APSA15-01<\/a>), and said:<\/p>\n<blockquote><p>UPDATE (January 24): Users who have enabled auto-update for the Flash Player desktop runtime will be receiving version 16.0.0.296 beginning on January 24. This version includes a fix for CVE-2015-0311. Adobe expects to have an update available for manual download during the week of January 26, and we are working with our distribution partners to make the update available in Google Chrome and Internet Explorer 10 and 11.<\/p><\/blockquote>\n<p>That&#8217;s great news! But how can you\u00a0check if\u00a0this manual update is available to you, and securely\u00a0download and install it? Follow the\u00a0steps outlined below.<\/p>\n<h3>How to\u00a0Manually Update Flash Player<\/h3>\n<p>If you\u2019re unsure what version of Adobe Flash you have running, or how to safely\u00a0install new updates, you can head over here for some <a title=\"How to Tell if Adobe Flash Player Update is Valid\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">answers to the most common Flash Player installation and update questions<\/a>.<\/p>\n<p>For\u00a0the easiest\u00a0way to check what Flash Player version you have installed on Mac OS X, and update to the latest version, follow these steps:<\/p>\n<ol>\n<li>Choose\u00a0the Apple menu icon (upper left corner on OS X desktop)<\/li>\n<li>Select System Preferences<\/li>\n<li>Then click on Flash Player at the bottom under Other<\/li>\n<li>In the Advanced tab, under Updates, press the Check Now button<\/li>\n<\/ol>\n<p>If you do not have the latest Flash Player version, you will see a notification that an update is available, and it will ask if you want to download and install it.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/adobe-flash-player-update-available\/\" rel=\"attachment wp-att-36016\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36016\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/adobe-flash-player-update-available.png\" alt=\"Adobe Flash Player update available notice\" width=\"425\" height=\"136\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/adobe-flash-player-update-available.png 425w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/adobe-flash-player-update-available-150x48.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/adobe-flash-player-update-available-300x96.png 300w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/><\/a><\/p>\n<ol start=\"5\">\n<li>Click Yes, and then follow all of the prompts from Adobe for updating to the latest version of Flash Player<\/li>\n<\/ol>\n<p>Now you should see that <strong>NPAPI plug-in version 16.0.0.296 is installed<\/strong>. This is the latest version of Flash Player and includes patches for both\u00a00-day vulnerabilities (CVE-2015-0310, CVE-2015-0311) affecting earlier Flash Player versions.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/flash-player-panel\/\" rel=\"attachment wp-att-36019\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36019\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Flash-Player-Panel.png\" alt=\"Flash Player Mac OS X Panel\" width=\"667\" height=\"596\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Flash-Player-Panel.png 667w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Flash-Player-Panel-150x134.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Flash-Player-Panel-300x268.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Flash-Player-Panel-657x587.png 657w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>By using this method to check for\u00a0Adobe Flash Player updates,\u00a0your computer\u2019s internal system will properly check and connect you to Adobe\u2019s website.\u00a0Because OS X\u2019s internal system bypasses fake websites entirely and makes it far less likely for users to be fooled by phishing websites, this is perhaps the most secure way to update Flash Player.<\/p>\n<p><strong>January 27 Update<\/strong>: Adobe&#8217;s security updates for Adobe Flash Player for Windows, Macintosh and Linux are now available for download from Adobe.com. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system, according to Adobe&#8217;s security bulletin (<a href=\"http:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb15-03.html\" target=\"_blank\">APSB15-03<\/a>).<\/p>\n<p>Affected (out of date) software versions include: Adobe Flash Player 16.0.0.287 and earlier versions, Adobe Flash Player 13.0.0.262 and earlier 13.x versions, and Adobe Flash Player 11.2.202.438 and earlier versions for Linux.<\/p>\n<p>Flash Player 16.0.0.296 for Mac and Windows, and Flash Player 11.2.202.440 for Linux, include patches for the following vulnerabilities:<\/p>\n<ul>\n<li>These updates resolve\u00a0a\u00a0use-after-free vulnerability\u00a0that\u00a0could\u00a0lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0311\" target=\"_blank\">CVE-2015-0311<\/a>).<\/li>\n<li>These\u00a0updates resolve a double-free vulnerability that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0312\" target=\"_blank\">CVE-2015-0312<\/a>).<\/li>\n<\/ul>\n<p>Users of Adobe Flash Player desktop runtime for Windows and Macintosh should <a title=\"Link to Adobe.com Flash Player download page\" href=\"http:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">update to Adobe Flash Player 16.0.0.296<\/a>. Users of Adobe Flash Player\u00a0for Linux should update to Adobe Flash Player 11.2.202.440. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically be updated to version 16.0.0.296.<\/p>\n<div>\n<hr>\n<div>\n<p><a title=\"Mac antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a> with up-to-date malware definitions detects these Flash Player vulnerabilities as <strong>Flash\/CVE-2015-0311<\/strong> and <strong>Flash\/NuclearEK<\/strong>.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\u00a0(CVE-2015-0311) affecting Adobe Flash Player 16.0.0.287 and earlier versions for Mac and Windows. Adobe previously patched one of the critical 0-Day vulnerabilities with an update to Flash Player 16.0.0.287, but was still investigating reports [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,979,1858,1873,1885,52,1876,1963,1966,174,168,701],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\u00a0(CVE-2015-0311)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\u00a0(CVE-2015-0311)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-26T19:13:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:51:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/\",\"name\":\"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#primaryimage\"},\"datePublished\":\"2015-01-26T19:13:05+00:00\",\"dateModified\":\"2017-01-06T23:51:45+00:00\",\"description\":\"Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\\u00a0(CVE-2015-0311)\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296\",\"datePublished\":\"2015-01-26T19:13:05+00:00\",\"dateModified\":\"2017-01-06T23:51:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#webpage\"},\"wordCount\":632,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe\",\"Adobe Flash\",\"CVE-2015-0310\",\"CVE-2015-0311\",\"CVE-2015-0312\",\"Exploit\",\"Flash Player 16.0.0.296\",\"Flash\/CVE-2015-0311\",\"Flash\/NuclearEK\",\"Mac\",\"OS X\",\"Zero-Day Vulnerability\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\u00a0(CVE-2015-0311)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/","og_locale":"en_US","og_type":"article","og_title":"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296 - The Mac Security Blog","og_description":"Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\u00a0(CVE-2015-0311)","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-01-26T19:13:05+00:00","article_modified_time":"2017-01-06T23:51:45+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/","name":"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#primaryimage"},"datePublished":"2015-01-26T19:13:05+00:00","dateModified":"2017-01-06T23:51:45+00:00","description":"Over the weekend, on January 24, Adobe Systems released another Flash Player update that includes a fix for a second 0-day vulnerability\u00a0(CVE-2015-0311)","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe Patches Second 0-Day Flaw with Flash Player 16.0.0.296","datePublished":"2015-01-26T19:13:05+00:00","dateModified":"2017-01-06T23:51:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#webpage"},"wordCount":632,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe","Adobe Flash","CVE-2015-0310","CVE-2015-0311","CVE-2015-0312","Exploit","Flash Player 16.0.0.296","Flash\/CVE-2015-0311","Flash\/NuclearEK","Mac","OS X","Zero-Day Vulnerability"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-second-0day-flaw-with-flash-player-16-0-0-296\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9mI","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36004"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=36004"}],"version-history":[{"count":21,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36004\/revisions"}],"predecessor-version":[{"id":61033,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36004\/revisions\/61033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=36004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=36004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=36004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}