Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-4117 PoC — Adobe Flash Player 任意代码执行漏洞

Source
Associated Vulnerability
Title:Adobe Flash Player 任意代码执行漏洞 (CVE-2016-4117)
Description:Adobe Flash Player、Adobe AIR SDK和Adobe AIR SDK & Compiler都是美国奥多比(Adobe)公司的产品。Adobe Flash Player是一款多媒体播放器产品;Adobe AIR SDK和Adobe AIR SDK & Compiler都是适用于Adobe AIR(一个跨操作系统的运行时环境)的标准开发工具包。 多款Adobe产品中存在安全漏洞。远程攻击者可利用该漏洞执行任意代码,控制受影响系统,造成拒绝服务。以下产品及版本受到影响:基于Win
Description
CVE-2016-4117
Readme
# CVE-2016-4117


CVE-2016-4117 Bug affects Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors 

This is the source used in the wild by magnitude exploit kit.

For educational purposes only. 
File Snapshot

[4.0K] /data/pocs/1ef46bea29dceeafecd711c25154436ea662a503 ├── [ 199] Data1.as ├── [ 235] Data2.as ├── [ 852] Data3.as ├── [1.3K] Data4.as ├── [ 10K] Data5.as ├── [ 238] Data6.as ├── [ 238] Data7.as ├── [ 238] Data8.as ├── [6.5K] Data99.as ├── [ 238] Data9.as ├── [ 525] Data.as ├── [4.0K] MP3 │   ├── [4.3K] Play1.as │   └── [ 1] README.md ├── [4.0K] MP4 │   ├── [2.4K] Play2.as │   ├── [5.6K] Play3.as │   └── [ 1] README.md └── [ 257] README.md 2 directories, 17 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.