{"id":158,"date":"2011-03-18T09:54:19","date_gmt":"2011-03-18T13:54:19","guid":{"rendered":"http:\/\/www.digitalundercurrents.com\/blog\/?p=158"},"modified":"2011-03-18T09:54:19","modified_gmt":"2011-03-18T13:54:19","slug":"flash-vulnerability","status":"publish","type":"post","link":"http:\/\/www.digitalundercurrents.com\/blog\/?p=158","title":{"rendered":"Flash Vulnerability"},"content":{"rendered":"<p>Sometimes I feel like there should be a category on here specific to Adobe Flash vulnerabilities. It seems to leak like a sieve.<\/p>\n<p>Well, <a href=\"http:\/\/www.us-cert.gov\/current\/#adobe_releases_security_advisory_for6\">here&#8217;s another one<\/a>. The Flash plugin can be exploited by an attacker to run arbitrary code or cause a DoS condition. A fix is expected next week; disabling Flash in your browser this week might be a smart move.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes I feel like there should be a category on here specific to Adobe Flash vulnerabilities. It seems to leak like a sieve. Well, here&#8217;s another one. The Flash plugin can be exploited by an attacker to run arbitrary code or cause a DoS condition. A fix is expected next week; disabling Flash in your [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-158","post","type-post","status-publish","format-standard","hentry","category-exploits"],"_links":{"self":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=158"}],"version-history":[{"count":0,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/158\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=158"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}