{"id":40330,"date":"2015-04-14T12:23:48","date_gmt":"2015-04-14T19:23:48","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=40330"},"modified":"2015-05-18T09:40:56","modified_gmt":"2015-05-18T16:40:56","slug":"adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/","title":{"rendered":"Adobe Patches Flash Flaw Targeted by Exploit in the Wild"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\"><img loading=\"lazy\" class=\" wp-image-10591 alignright\" style=\"border: 1px solid black;\" title=\"Adobe Patches Flash Flaw Targeted by Exploit in the Wild\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\" alt=\"adobe-patched-header\" width=\"185\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg 325w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-150x101.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-300x203.jpg 300w\" sizes=\"(max-width: 185px) 100vw, 185px\" \/><\/a>Adobe Systems has released a patch for\u00a022 vulnerabilities in Flash Player, one of which is reportedly\u00a0under attack by an exploit that exists <a title=\"What Does \u201cIn the Wild\u201d Mean When Talking About Malware?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/\" target=\"_blank\">in the wild<\/a>. The most critical vulnerability, CVE-2015-3043, could lead to code execution. Adobe&#8217;s Flash Player security updates are available for Macintosh, Windows and Linux.<\/p>\n<p>&#8220;Adobe is aware of a report that an exploit for CVE-2015-3043 exists in the wild, and recommends users update their product installations,&#8221; said\u00a0<a title=\"APSB15-06\" href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb15-06.html\" target=\"_blank\">Adobe<\/a>. If you reached this page because you&#8217;re unsure if a popup alert from Adobe is real, take a look at our helpful guide for best practices <a title=\"How to Tell if Adobe Flash Player Update is Valid\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">how to safely install and update Adobe Flash Player<\/a>.<\/p>\n<p>Affected\u00a0software versions (now out of date and vulnerable) include: Adobe Flash Player 17.0.0.134 and earlier versions, Adobe Flash Player 13.0.0.277 and earlier 13.x versions, and Adobe Flash Player 11.2.202.451 and earlier 11.x versions.<\/p>\n<p>Adobe&#8217;s security bulletin describes the\u00a0vulnerabilities patched in these updates as follows:<\/p>\n<ul>\n<li>These updates resolve\u00a0memory corruption\u00a0vulnerabilities\u00a0that\u00a0could\u00a0lead to code execution\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0347\" target=\"_blank\">CVE-2015-0347<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0350\" target=\"_blank\">CVE-2015-0350<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0352\" target=\"_blank\">CVE-2015-0352<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0353\" target=\"_blank\">CVE-2015-0353<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0354\" target=\"_blank\">CVE-2015-0354<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0355\" target=\"_blank\">CVE-2015-0355<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0360\" target=\"_blank\">CVE-2015-0360<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3038\" target=\"_blank\">CVE-2015-3038<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3041\" target=\"_blank\">CVE-2015-3041<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3042\" target=\"_blank\">CVE-2015-3042<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3043\" target=\"_blank\">CVE-2015-3043<\/a>).<\/li>\n<li>These updates resolve\u00a0a\u00a0type confusion\u00a0vulnerability\u00a0that\u00a0could\u00a0lead to code execution\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0356\" target=\"_blank\">CVE-2015-0356<\/a>).<\/li>\n<li>These updates resolve\u00a0a\u00a0buffer\u00a0overflow\u00a0vulnerability\u00a0that\u00a0could\u00a0lead to code execution\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0348\" target=\"_blank\">CVE-2015-0348<\/a>).<\/li>\n<li>These updates resolve\u00a0use-after-free vulnerabilities\u00a0that\u00a0could\u00a0lead to code execution\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0349\" target=\"_blank\">CVE-2015-0349<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0351\" target=\"_blank\">CVE-2015-0351<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0358\" target=\"_blank\">CVE-2015-0358<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3039\" target=\"_blank\">CVE-2015-3039<\/a>).<\/li>\n<li>These updates resolve double-free vulnerabilities that\u00a0could\u00a0lead to code execution\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0346\" target=\"_blank\">CVE-2015-0346<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0359\" target=\"_blank\">CVE-2015-0359<\/a>).<\/li>\n<li>These updates resolve\u00a0memory\u00a0leak\u00a0vulnerabilities that could be used to bypass ASLR\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0357\" target=\"_blank\">CVE-2015-0357<\/a>,\u00a0<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3040\" target=\"_blank\">CVE-2015-3040<\/a>).<\/li>\n<li>These updates resolve\u00a0a security bypass\u00a0vulnerability\u00a0that could\u00a0lead to information disclosure\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3044\" target=\"_blank\">CVE-2015-3044<\/a>).<\/li>\n<\/ul>\n<p>Adobe Flash users running\u00a0Mac OS X and Windows computers should\u00a0<a title=\"Get Adobe Flash Player\" href=\"https:\/\/get2.adobe.com\/flashplayer\/\" target=\"_blank\">update to Adobe Flash Player 17.0.0.169<\/a> (14.9 MB) as soon as possible to avoid potential attacks. Linux users should update to Adobe Flash Player 11.2.202.457.<\/p>\n<p>Adobe Flash Player installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Flash Player 17.0.0.169. Moreover, Adobe Flash installed with Internet Explorer (IE) for Windows 8.x will automatically be updated to the latest version when available, which will include Adobe Flash Player 17.0.0.169.<\/p>\n<p>In addition to patching Flash Player vulnerabilities, Adobe has also released security updates for\u00a0<a title=\"APSB15-07\" href=\"https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb15-07.html\" target=\"_blank\">ColdFusion<\/a>\u00a0and\u00a0<a title=\"APSB15-08\" href=\"https:\/\/helpx.adobe.com\/security\/products\/flex\/apsb15-08.html\" target=\"_blank\">Adobe Flex<\/a>\u2014each addressing a separate vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe Flash Player users should update to Adobe Flash Player 17.0.0.169 to avoid potential attacks. An exploit for CVE-2015-3043 exists in the wild. <\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,2143,52,182,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Adobe Flash Player users should update to Adobe Flash Player 17.0.0.169 to avoid potential attacks. An exploit for CVE-2015-3043 exists in the wild.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Patches Flash Flaw Targeted by Exploit in the Wild - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Adobe Flash Player users should update to Adobe Flash Player 17.0.0.169 to avoid potential attacks. An exploit for CVE-2015-3043 exists in the wild.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-14T19:23:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-05-18T16:40:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/\",\"name\":\"Adobe Patches Flash Flaw Targeted by Exploit in the Wild - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#primaryimage\"},\"datePublished\":\"2015-04-14T19:23:48+00:00\",\"dateModified\":\"2015-05-18T16:40:56+00:00\",\"description\":\"Adobe Flash Player users should update to Adobe Flash Player 17.0.0.169 to avoid potential attacks. An exploit for CVE-2015-3043 exists in the wild.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Patches Flash Flaw Targeted by Exploit in the Wild\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe Patches Flash Flaw Targeted by Exploit in the Wild\",\"datePublished\":\"2015-04-14T19:23:48+00:00\",\"dateModified\":\"2015-05-18T16:40:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#webpage\"},\"wordCount\":397,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe\",\"CVE-2015-3043\",\"Exploit\",\"Flash Player\",\"Vulnerabilities\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Adobe Flash Player users should update to Adobe Flash Player 17.0.0.169 to avoid potential attacks. An exploit for CVE-2015-3043 exists in the wild.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/","og_locale":"en_US","og_type":"article","og_title":"Adobe Patches Flash Flaw Targeted by Exploit in the Wild - The Mac Security Blog","og_description":"Adobe Flash Player users should update to Adobe Flash Player 17.0.0.169 to avoid potential attacks. An exploit for CVE-2015-3043 exists in the wild.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-04-14T19:23:48+00:00","article_modified_time":"2015-05-18T16:40:56+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/","name":"Adobe Patches Flash Flaw Targeted by Exploit in the Wild - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#primaryimage"},"datePublished":"2015-04-14T19:23:48+00:00","dateModified":"2015-05-18T16:40:56+00:00","description":"Adobe Flash Player users should update to Adobe Flash Player 17.0.0.169 to avoid potential attacks. An exploit for CVE-2015-3043 exists in the wild.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe Patches Flash Flaw Targeted by Exploit in the Wild"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe Patches Flash Flaw Targeted by Exploit in the Wild","datePublished":"2015-04-14T19:23:48+00:00","dateModified":"2015-05-18T16:40:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#webpage"},"wordCount":397,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe","CVE-2015-3043","Exploit","Flash Player","Vulnerabilities"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-patches-flash-flaw-targeted-by-exploit-in-the-wild\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-auu","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40330"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=40330"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40330\/revisions"}],"predecessor-version":[{"id":41572,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40330\/revisions\/41572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=40330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=40330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=40330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}