Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015.Referenceshttp://rhn.redhat.com/errata/RHSA-2015-1913.htmlhttps://www.exploit-db.com/exploits/38490/http://rhn.redhat.com/errata/RHSA-2015-2024.htmlhttps://helpx.adobe.com/security/products/flash-player/apsa15-05.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-10/msg00016.htmlhttp://www.securitytracker.com/id/1033850http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.htmlhttp://www.securityfocus.com/bid/77081https://helpx.adobe.com/security/products/flash-player/apsb15-27.htmlhttps://security.gentoo.org/glsa/201511-02http://packetstormsecurity.com/files/134009/Adobe-Flash-IExternalizable.writeExternal-Type-Confusion.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-10/msg00015.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.htmlhttp://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/