{"id":48793,"date":"2015-12-14T10:24:25","date_gmt":"2015-12-14T18:24:25","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=48793"},"modified":"2015-12-14T10:24:25","modified_gmt":"2015-12-14T18:24:25","slug":"adobe-issues-final-2015-flash-player-security-update","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/","title":{"rendered":"Adobe Issues Final 2015 Flash Player Security Update"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\"><img loading=\"lazy\" class=\" wp-image-10591 alignright\" style=\"border: 1px solid black;\" title=\"Adobe Issues Final 2015 Flash Player Update\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\" alt=\"adobe-patched-header\" width=\"185\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg 325w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-150x101.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-300x203.jpg 300w\" sizes=\"(max-width: 185px) 100vw, 185px\" \/><\/a>Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235 addresses\u00a0&#8220;critical vulnerabilities&#8221; that could potentially allow an attacker to take control of the affected system, according to <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb15-32.html\" target=\"_blank\">Adobe&#8217;s security bulletin<\/a>\u00a0(APSB15-32).<\/p>\n<p>Seventy-nine vulnerabilities were patched in Adobe&#8217;s final 2015 software update.<\/p>\n<p>Following the update, chief technology officer at Qualys, Wolfgang Kandek, <a href=\"http:\/\/www.v3.co.uk\/v3-uk\/news\/2438709\/adobe-updates-flash-player-to-resolve-79-security-flaws\" target=\"_blank\">said<\/a>:<\/p>\n<blockquote><p>&#8220;All but three of the vulnerabilitities could be used by an attacker to gain code execution running under the user in the browser. [&#8230;] Flash-based attacks have been a favorite for attackers this year with many exploit kids providing very up-to-date exploits \u2014 include this in your high priority items.&#8221;<\/p><\/blockquote>\n<p><strong>RELATED: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">How to Tell if Adobe Flash Player Update is Valid<\/a><\/strong><\/p>\n<p>Adobe software affected by these updates include the following:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-48802\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/flash-player-update-12.08.15-affected-versions.png\" alt=\"Adobe Flash Player update 12.08.2015 affected versions\" width=\"680\" height=\"280\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/flash-player-update-12.08.15-affected-versions.png 680w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/flash-player-update-12.08.15-affected-versions-150x62.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/flash-player-update-12.08.15-affected-versions-300x124.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/flash-player-update-12.08.15-affected-versions-657x271.png 657w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>Details of the vulnerabilities addressed in this update are as follows:<\/p>\n<ul>\n<li>These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8438\" target=\"_blank\">CVE-2015-8438<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8446\" target=\"_blank\">CVE-2015-8446<\/a>).<\/li>\n<li>These updates resolve memory corruption vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8444\" target=\"_blank\">CVE-2015-8444<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8443\" target=\"_blank\">CVE-2015-8443<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8417\" target=\"_blank\">CVE-2015-8417<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8416\" target=\"_blank\">CVE-2015-8416<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8451\" target=\"_blank\">CVE-2015-8451<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8047\" target=\"_blank\">CVE-2015-8047<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8455\" target=\"_blank\">CVE-2015-8455<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8045\" target=\"_blank\">CVE-2015-8045<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8418\" target=\"_blank\">CVE-2015-8418<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8060\" target=\"_blank\">CVE-2015-8060<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8419\" target=\"_blank\">CVE-2015-8419<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8408\" target=\"_blank\">CVE-2015-8408<\/a>).<\/li>\n<li>These updates resolve security bypass vulnerabilities (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8453\" target=\"_blank\">CVE-2015-8453<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8440\" target=\"_blank\">CVE-2015-8440<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8409\" target=\"_blank\">CVE-2015-8409<\/a>).<\/li>\n<li>These updates resolve a stack overflow vulnerability that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8407\" target=\"_blank\">CVE-2015-8407<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8457\" target=\"_blank\">CVE-2015-8457<\/a>).<\/li>\n<li>These updates resolve a type confusion vulnerability that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8439\" target=\"_blank\">CVE-2015-8439<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8456\" target=\"_blank\">CVE-2015-8456<\/a>).<\/li>\n<li>These updates resolve an integer overflow vulnerability that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8445\" target=\"_blank\">CVE-2015-8445<\/a>).<\/li>\n<li>These updates resolve a buffer overflow vulnerability that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8415\" target=\"_blank\">CVE-2015-8415<\/a>)<\/li>\n<li>These updates resolve use-after-free vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8050\" target=\"_blank\">CVE-2015-8050<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8049\" target=\"_blank\">CVE-2015-8049<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8437\" target=\"_blank\">CVE-2015-8437<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8450\" target=\"_blank\">CVE-2015-8450<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8449\" target=\"_blank\">CVE-2015-8449<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8448\" target=\"_blank\">CVE-2015-8448<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8436\" target=\"_blank\">CVE-2015-8436<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8452\" target=\"_blank\">CVE-2015-8452<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8048\" target=\"_blank\">CVE-2015-8048<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8413\" target=\"_blank\">CVE-2015-8413<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8412\" target=\"_blank\">CVE-2015-8412<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8410\" target=\"_blank\">CVE-2015-8410<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8411\" target=\"_blank\">CVE-2015-8411<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8424\" target=\"_blank\">CVE-2015-8424<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8422\" target=\"_blank\">CVE-2015-8422<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8420\" target=\"_blank\">CVE-2015-8420<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8421\" target=\"_blank\">CVE-2015-8421<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8423\" target=\"_blank\">CVE-2015-8423<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8425\" target=\"_blank\">CVE-2015-8425<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8433\" target=\"_blank\">CVE-2015-8433<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8432\" target=\"_blank\">CVE-2015-8432<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8431\" target=\"_blank\">CVE-2015-8431<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8426\" target=\"_blank\">CVE-2015-8426<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8430\" target=\"_blank\">CVE-2015-8430<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8427\" target=\"_blank\">CVE-2015-8427<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8428\" target=\"_blank\">CVE-2015-8428<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8429\" target=\"_blank\">CVE-2015-8429<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8434\" target=\"_blank\">CVE-2015-8434<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8435\" target=\"_blank\">CVE-2015-8435<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8414\" target=\"_blank\">CVE-2015-8414<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8454\" target=\"_blank\">CVE-2015-8454<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8059\" target=\"_blank\">CVE-2015-8059<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8058\" target=\"_blank\">CVE-2015-8058<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8055\" target=\"_blank\">CVE-2015-8055<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8057\" target=\"_blank\">CVE-2015-8057<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8056\" target=\"_blank\">CVE-2015-8056<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8061\" target=\"_blank\">CVE-2015-8061<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8067\" target=\"_blank\">CVE-2015-8067<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8066\" target=\"_blank\">CVE-2015-8066<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8062\" target=\"_blank\">CVE-2015-8062<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8068\" target=\"_blank\">CVE-2015-8068<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8064\" target=\"_blank\">CVE-2015-8064<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8065\" target=\"_blank\">CVE-2015-8065<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8063\" target=\"_blank\">CVE-2015-8063<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8405\" target=\"_blank\">CVE-2015-8405<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8404\" target=\"_blank\">CVE-2015-8404<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8402\" target=\"_blank\">CVE-2015-8402<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8403\" target=\"_blank\">CVE-2015-8403<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8071\" target=\"_blank\">CVE-2015-8071<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8401\" target=\"_blank\">CVE-2015-8401<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8406\" target=\"_blank\">CVE-2015-8406<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8069\" target=\"_blank\">CVE-2015-8069<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8070\" target=\"_blank\">CVE-2015-8070<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8441\" target=\"_blank\">CVE-2015-8441<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8442\" target=\"_blank\">CVE-2015-8442<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8447\" target=\"_blank\">CVE-2015-8447<\/a>).<\/li>\n<\/ul>\n<p>Mac and Windows users running Adobe Flash Player Desktop Runtime\u00a0should <a href=\"https:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">update to Flash Player 20.0.0.235<\/a> (16.2 MB) as soon as possible, and Linux users should update to Flash Player 11.2.202.554. Google Chrome will automatically update to the latest version, which includes Adobe Flash Player 20.0.0.228 for Windows, Mac, Linux and Chrome OS. Users of the AIR desktop runtime should update to version 20.0.0.204 by visiting the <a href=\"https:\/\/get.adobe.com\/air\/\" target=\"_blank\">AIR download center<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235 addresses\u00a0&#8220;critical vulnerabilities&#8221; that could potentially allow an attacker to take control of the affected system, according to Adobe&#8217;s security bulletin\u00a0(APSB15-32). Seventy-nine vulnerabilities were patched in Adobe&#8217;s final 2015 software update. Following the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,2611],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Issues Final 2015 Flash Player Security Update - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-14T18:24:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/\",\"name\":\"Adobe Issues Final 2015 Flash Player Security Update - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#primaryimage\"},\"datePublished\":\"2015-12-14T18:24:25+00:00\",\"dateModified\":\"2015-12-14T18:24:25+00:00\",\"description\":\"Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Issues Final 2015 Flash Player Security Update\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe Issues Final 2015 Flash Player Security Update\",\"datePublished\":\"2015-12-14T18:24:25+00:00\",\"dateModified\":\"2015-12-14T18:24:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#webpage\"},\"wordCount\":466,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe\",\"Flash Player 20.0.0.235\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/","og_locale":"en_US","og_type":"article","og_title":"Adobe Issues Final 2015 Flash Player Security Update - The Mac Security Blog","og_description":"Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-12-14T18:24:25+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/","name":"Adobe Issues Final 2015 Flash Player Security Update - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#primaryimage"},"datePublished":"2015-12-14T18:24:25+00:00","dateModified":"2015-12-14T18:24:25+00:00","description":"Adobe has released security updates for Adobe Flash Player, releasing version 20.0.0.235 as its final 2015 update of the year. Flash Player 20.0.0.235","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe Issues Final 2015 Flash Player Security Update"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe Issues Final 2015 Flash Player Security Update","datePublished":"2015-12-14T18:24:25+00:00","dateModified":"2015-12-14T18:24:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#webpage"},"wordCount":466,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe","Flash Player 20.0.0.235"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-issues-final-2015-flash-player-security-update\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cGZ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48793"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=48793"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48793\/revisions"}],"predecessor-version":[{"id":48829,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48793\/revisions\/48829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=48793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=48793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=48793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}