	{"id":52378,"date":"2016-04-08T12:09:49","date_gmt":"2016-04-08T19:09:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=52378"},"modified":"2016-04-08T12:12:03","modified_gmt":"2016-04-08T19:12:03","slug":"adobe-update-flash-player-immediately-exploit-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/","title":{"rendered":"Adobe: Update Flash Player Immediately, Exploit in the Wild"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-52384\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available.png\" alt=\"Adobe Flash Player 21.0.0.213 Available \" width=\"715\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available.png 715w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available-300x168.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Flash-Player-21.0.0.213-Available-657x368.png 657w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><\/p>\n<p>From the department of things we\u2019ve heard before but can\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical vulnerabilities. In outdated Flash versions there exists an exploit in the wild for a critical vulnerability in which millions of Adobe Flash users are impacted.<\/p>\n<p>The vulnerability, identified as CVE-2016-1019, exists in Adobe Flash Player 21.0.0.197 and earlier versions for Windows, Macintosh, Linux, and Chrome OS.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\"><img loading=\"lazy\" class=\" wp-image-10591 alignright\" style=\"border: 1px solid black;\" title=\"Adobe: Update Flash Player Immediately, Exploit in the Wild\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg\" alt=\"adobe-patched-header\" width=\"185\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header.jpg 325w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-150x101.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/adobe-patched-header-300x203.jpg 300w\" sizes=\"(max-width: 185px) 100vw, 185px\" \/><\/a><\/p>\n<blockquote><p>\u201cSuccessful exploitation could cause a crash and potentially allow an attacker to take control of the affected system,\u201d <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsa16-01.html\" target=\"_blank\">Adobe said<\/a>. \u201cCVE-2016-1019 is being actively exploited on systems running Windows 10 and earlier with Flash Player version 20.0.0.306 and earlier.\u201d<\/p><\/blockquote>\n<p>According to <a href=\"https:\/\/www.yahoo.com\/tech\/flash-adobe-issues-emergency-ransomware-084555393.html?src=rss\" target=\"_blank\">Trevor Mogg over at Digital Trends<\/a>, Adobe issued a\u00a0global alert to all computer users\u00a0to\u00a0warn about the\u00a0major flaw, which\u00a0is said to leave machines open to ransomware attacks.<\/p>\n<p>Adobe software affected by critical vulnerabilities include the following:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-52393\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Affected-Adobe-Software-0408.png\" alt=\"Affected Adobe Software April 8 2016\" width=\"678\" height=\"215\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Affected-Adobe-Software-0408.png 678w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Affected-Adobe-Software-0408-150x48.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Affected-Adobe-Software-0408-300x95.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/04\/Affected-Adobe-Software-0408-657x208.png 657w\" sizes=\"(max-width: 678px) 100vw, 678px\" \/><\/p>\n<p>If you still use Adobe Flash, you should immediately update to Flash Player version 21.0.0.213. Check to see which Flash version you\u2019re running right now.<\/p>\n<p><strong>RELATED: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">How to Tell if Adobe Flash Player Update is Valid<\/a>\u00a0<\/strong><\/p>\n<p>The full list of vulnerabilities patched in the\u00a0new Adobe Flash\u00a0includes the following:<\/p>\n<ul>\n<li>These updates harden a mitigation against JIT spraying attacks that could be used to bypass memory layout randomization mitigations (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1006\" target=\"_blank\">CVE-2016-1006<\/a>).<\/li>\n<li>These updates resolve type confusion vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1015\" target=\"_blank\">CVE-2016-1015<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1019\" target=\"_blank\">CVE-2016-1019<\/a>).<\/li>\n<li>These updates resolve use-after-free vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1011\" target=\"_blank\">CVE-2016-1011<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1013\" target=\"_blank\">CVE-2016-1013<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1016\" target=\"_blank\">CVE-2016-1016<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1017\" target=\"_blank\">CVE-2016-1017<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1031\" target=\"_blank\">CVE-2016-1031<\/a>).<\/li>\n<li>These updates resolve memory corruption vulnerabilities that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1012\" target=\"_blank\">CVE-2016-1012<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1020\" target=\"_blank\">CVE-2016-1020<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1021\" target=\"_blank\">CVE-2016-1021<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1022\" target=\"_blank\">CVE-2016-1022<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1023\" target=\"_blank\">CVE-2016-1023<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1024\" target=\"_blank\">CVE-2016-1024<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1025\" target=\"_blank\">CVE-2016-1025<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1026\" target=\"_blank\">CVE-2016-1026<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1027\" target=\"_blank\">CVE-2016-1027<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1028\" target=\"_blank\">CVE-2016-1028<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1029\" target=\"_blank\">CVE-2016-1029<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1032\" target=\"_blank\">CVE-2016-1032<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1033\" target=\"_blank\">CVE-2016-1033<\/a>).<\/li>\n<li>These updates resolve a stack overflow vulnerability that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1018\" target=\"_blank\">CVE-2016-1018<\/a>).<\/li>\n<li>These updates resolve a security bypass vulnerability (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1030\" target=\"_blank\">CVE-2016-1030<\/a>).<\/li>\n<li>These updates resolve a vulnerability in the directory search path used to find resources that could lead to code execution (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1014\" target=\"_blank\">CVE-2016-1014<\/a>).<\/li>\n<\/ul>\n<p>For a list of acknowledgements highlighting the researchers who discovered the flaws patched in these updates, see Adobe\u2019s Security Bulletin (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb16-10.html\" target=\"_blank\">APSB16-10<\/a>).<\/p>\n<p>Mac and Windows users running Adobe Flash Player Desktop Runtime should update to <a href=\"https:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">Flash Player 21.0.0.213<\/a> (17.7 MB) immediately, and Extended Support Release users should update to version 18.0.0.343.<\/p>\n<p>Linux users require a different version and should update to Flash Player 11.2.202.616 by visiting the Adobe Flash Player Download Center.<\/p>\n<p>Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 21.0.0.213 for Windows, Macintosh, Linux and Chrome OS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the department of things we\u2019ve heard before but can\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical vulnerabilities. In outdated Flash versions there exists an exploit in the wild for a critical vulnerability in which millions of Adobe Flash users are impacted. The vulnerability, identified as CVE-2016-1019, exists [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,2884,52,2881],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"From the department of things we\u2019ve heard before but can\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe: Update Flash Player Immediately, Exploit in the Wild - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"From the department of things we\u2019ve heard before but can\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-08T19:09:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-04-08T19:12:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/\",\"name\":\"Adobe: Update Flash Player Immediately, Exploit in the Wild - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#primaryimage\"},\"datePublished\":\"2016-04-08T19:09:49+00:00\",\"dateModified\":\"2016-04-08T19:12:03+00:00\",\"description\":\"From the department of things we\\u2019ve heard before but can\\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe: Update Flash Player Immediately, Exploit in the Wild\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe: Update Flash Player Immediately, Exploit in the Wild\",\"datePublished\":\"2016-04-08T19:09:49+00:00\",\"dateModified\":\"2016-04-08T19:12:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#webpage\"},\"wordCount\":452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe\",\"CVE-2016-1019\",\"Exploit\",\"Flash Player 21.0.0.213\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"From the department of things we\u2019ve heard before but can\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/","og_locale":"en_US","og_type":"article","og_title":"Adobe: Update Flash Player Immediately, Exploit in the Wild - The Mac Security Blog","og_description":"From the department of things we\u2019ve heard before but can\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-04-08T19:09:49+00:00","article_modified_time":"2016-04-08T19:12:03+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/","name":"Adobe: Update Flash Player Immediately, Exploit in the Wild - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#primaryimage"},"datePublished":"2016-04-08T19:09:49+00:00","dateModified":"2016-04-08T19:12:03+00:00","description":"From the department of things we\u2019ve heard before but can\u2019t ignore, Adobe has issued an emergency security update for Flash Player to address critical","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe: Update Flash Player Immediately, Exploit in the Wild"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe: Update Flash Player Immediately, Exploit in the Wild","datePublished":"2016-04-08T19:09:49+00:00","dateModified":"2016-04-08T19:12:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#webpage"},"wordCount":452,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe","CVE-2016-1019","Exploit","Flash Player 21.0.0.213"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-update-flash-player-immediately-exploit-in-the-wild\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dCO","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/52378"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=52378"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/52378\/revisions"}],"predecessor-version":[{"id":52423,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/52378\/revisions\/52423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=52378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=52378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=52378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}