Adobe Flash Professional CS5 is prone to a vulnerability that may allow execution of dwmapi.dll if this dll is located in the same folder than .FLA file. The attacker must entice a victim into opening a specially crafted .FLA file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a vulnerability in Adobe Flash Player triggered when processing a specially crafted SWF file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
A vulnerability has been identified in Adobe Flash Player, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by an uninitialized memory access triggered by a specially crafted .SWF file, which could be exploited by attackers to execute arbitrary code. This module creates a Microsoft Office Excel .XLS document containing an embedded .SWF file, and waits for an unsuspecting user to trigger the vulnerability by opening the .XLS file with Microsoft Office Excel. This vulnerability has been found exploited in-the-wild during March 2011.
This module exploits a memory corruption vulnerability in Adobe Flash Player when parsing a specially crafted .SWF file, which can be leveraged to execute arbitrary code on vulnerable machines by convincing an unsuspecting user to visit a malicious web site. This vulnerability has been found exploited in-the-wild during April 2011.
This module exploits a vulnerability in Adobe Flash Player triggered when processing a specially crafted .SWF file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This exploit works with the ActiveX implementation (Flash10b.ocx and prior versions) of Adobe Flash Player through Microsoft Internet Explorer and also with the Mozilla Firefox Plugin (NPSWF32.dll).
This module exploits a vulnerability in Adobe Flash Player triggered when processing a specially crafted SWF file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This exploit works only with ActiveX implementation (Flash9e.ocx) of Adobe Flash Player through Microsoft Internet Explorer.
This module exploits a Use-After-Free vulnerability in Adobe Flash Player. The method ByteArray::clear does not notify the suscriber when frees the memory assigned to a ByteArray object leaving a dangling pointer that can be later dereferenced. This vulnerability allows attackers to execute arbitrary code on vulnerable machines by enticing unsuspecting users to visit a website serving a specially crafted SWF Flash file. This vulnerability was found exploited in the wild in February 2015.
Adobe Flash Player is prone to a use-after-free vulnerability when finishing a Worker thread containing a SharedObject. This vulnerability can be exploited to execute arbitrary code on vulnerable machines by convincing an unsuspecting user to visit a web site containing a specially crafted SWF file. This vulnerability has been found exploited in-the-wild during February 2014.
This module exploits a buffer overflow vulnerability in Adobe Flash Player in the flash.Display.Shader class when setting a Pixel Bender Filte as the Shader bytecode. This vulnerability has been found exploited in-the-wild during April 2014.