{"id":45280,"date":"2015-08-17T11:25:42","date_gmt":"2015-08-17T18:25:42","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=45280"},"modified":"2015-09-09T14:31:22","modified_gmt":"2015-09-09T21:31:22","slug":"adobe-updates-flash-player-ousts-35-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/","title":{"rendered":"Adobe Updates Flash Player, Ousts 35 Vulnerabilities"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\"><img loading=\"lazy\" class=\" wp-image-10591 alignright\" style=\"border: 1px solid black;\" title=\"Adobe Updates Flash Player, Ousts 35 Vulnerabilities\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\" alt=\"adobe-patched-header\" width=\"185\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg 325w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-150x101.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-300x203.jpg 300w\" sizes=\"(max-width: 185px) 100vw, 185px\" \/><\/a>Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\u00a0that could potentially allow a hacker to gain control of the affected system.\u00a0Adobe&#8217;s software\u00a0updates mitigate 35 vulnerabilities (CVEs) in outdated Flash Player versions.<\/p>\n<p>Affected Adobe software\u00a0\u2014\u00a0now outdated and vulnerable\u00a0to known flaws\u00a0\u2014\u00a0include:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-45409\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/outdated-adobe-software.png\" alt=\"Affected Adobe software\" width=\"680\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/outdated-adobe-software.png 680w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/outdated-adobe-software-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/outdated-adobe-software-300x110.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/outdated-adobe-software-657x242.png 657w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>The vulnerabilities patched with Flash Player 18.0.0.232 include the following:<\/p>\n<ul>\n<li>These updates resolve type confusion vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5128\" target=\"_blank\">CVE-2015-5128<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5554\" target=\"_blank\">CVE-2015-5554<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5555\" target=\"_blank\">CVE-2015-5555<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5558\" target=\"_blank\">CVE-2015-5558<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5562\" target=\"_blank\">CVE-2015-5562<\/a>).<\/li>\n<li>These updates include further hardening to a mitigation introduced in version 18.0.0.209 to defend against vector length corruptions (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5125\" target=\"_blank\">CVE-2015-5125<\/a>).<\/li>\n<li>These updates resolve use-after-free vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5550\" target=\"_blank\">CVE-2015-5550<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5551\" target=\"_blank\">CVE-2015-5551<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-3107\" target=\"_blank\">CVE-2015-3107<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5556\" target=\"_blank\">CVE-2015-5556<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5130\" target=\"_blank\">CVE-2015-5130<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5134\" target=\"_blank\">CVE-2015-5134<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5539\" target=\"_blank\">CVE-2015-5539<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5540\" target=\"_blank\">CVE-2015-5540<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5557\" target=\"_blank\">CVE-2015-5557<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5559\" target=\"_blank\">CVE-2015-5559<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5127\" target=\"_blank\">CVE-2015-5127<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5563\" target=\"_blank\">CVE-2015-5563<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5561\" target=\"_blank\">CVE-2015-5561<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5124\" target=\"_blank\">CVE-2015-5124<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5564\" target=\"_blank\">CVE-2015-5564<\/a>).<\/li>\n<li>These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5129\" target=\"_blank\">CVE-2015-5129<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5541\" target=\"_blank\">CVE-2015-5541<\/a>).<\/li>\n<li>These updates resolve buffer overflow vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5131\" target=\"_blank\">CVE-2015-5131<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5132\" target=\"_blank\">CVE-2015-5132<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5133\" target=\"_blank\">CVE-2015-5133<\/a>).<\/li>\n<li>These updates resolve memory corruption vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5544\" target=\"_blank\">CVE-2015-5544<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5545\" target=\"_blank\">CVE-2015-5545<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5546\" target=\"_blank\">CVE-2015-5546<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5547\" target=\"_blank\">CVE-2015-5547<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5548\" target=\"_blank\">CVE-2015-5548<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5549\" target=\"_blank\">CVE-2015-5549<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5552\" target=\"_blank\">CVE-2015-5552<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5553\" target=\"_blank\">CVE-2015-5553<\/a>).<\/li>\n<li>These updates resolve an integer overflow vulnerability that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-5560\" target=\"_blank\">CVE-2015-5560<\/a>).<\/li>\n<\/ul>\n<p>Mac and Windows users running Adobe Flash Player Desktop Runtime should update to <a href=\"https:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">Flash Player 18.0.0.232<\/a> as soon as possible. Linux users should download and install Adobe Flash Player 11.2.202.508 by visiting <a href=\"http:\/\/www.adobe.com\/go\/getflash\" target=\"_blank\">the Flash Player download center<\/a>. Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Chrome version, which will include Flash Player 18.0.0.232 on Windows and Macintosh, and version 18.0.0.233 for Lunix and Chrome OS. Lastly, Adobe recommends users of the AIR desktop runtime update to version 18.0.0.199 by visiting <a href=\"https:\/\/get.adobe.com\/air\/\" target=\"_blank\">the AIR download center<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\u00a0that could potentially allow a hacker to gain control of the affected system.\u00a0Adobe&#8217;s software\u00a0updates mitigate 35 vulnerabilities (CVEs) in outdated Flash Player versions. Affected Adobe software\u00a0\u2014\u00a0now outdated and vulnerable\u00a0to known flaws\u00a0\u2014\u00a0include: The vulnerabilities patched with Flash Player 18.0.0.232 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,2473],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\u00a0that could potentially\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Updates Flash Player, Ousts 35 Vulnerabilities - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\u00a0that could potentially\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-17T18:25:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-09-09T21:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/\",\"name\":\"Adobe Updates Flash Player, Ousts 35 Vulnerabilities - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#primaryimage\"},\"datePublished\":\"2015-08-17T18:25:42+00:00\",\"dateModified\":\"2015-09-09T21:31:22+00:00\",\"description\":\"Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\\u00a0that could potentially\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Updates Flash Player, Ousts 35 Vulnerabilities\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe Updates Flash Player, Ousts 35 Vulnerabilities\",\"datePublished\":\"2015-08-17T18:25:42+00:00\",\"dateModified\":\"2015-09-09T21:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#webpage\"},\"wordCount\":312,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe\",\"Flash Player 18.0.0.232\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\u00a0that could potentially","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Adobe Updates Flash Player, Ousts 35 Vulnerabilities - The Mac Security Blog","og_description":"Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\u00a0that could potentially","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-08-17T18:25:42+00:00","article_modified_time":"2015-09-09T21:31:22+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/","name":"Adobe Updates Flash Player, Ousts 35 Vulnerabilities - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#primaryimage"},"datePublished":"2015-08-17T18:25:42+00:00","dateModified":"2015-09-09T21:31:22+00:00","description":"Last week, Adobe Systems released Flash Player 18.0.0.232 with security updates for Mac and Windows users, patching vulnerabilities\u00a0that could potentially","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe Updates Flash Player, Ousts 35 Vulnerabilities"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe Updates Flash Player, Ousts 35 Vulnerabilities","datePublished":"2015-08-17T18:25:42+00:00","dateModified":"2015-09-09T21:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#webpage"},"wordCount":312,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe","Flash Player 18.0.0.232"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-updates-flash-player-ousts-35-vulnerabilities\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-bMk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/45280"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=45280"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/45280\/revisions"}],"predecessor-version":[{"id":45421,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/45280\/revisions\/45421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=45280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=45280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=45280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}