Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15982 PoC — Adobe Flash Player 安全漏洞

Source
Associated Vulnerability
Title:Adobe Flash Player 安全漏洞 (CVE-2018-15982)
Description:Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。 Adobe Flash Player中存在释放后重用漏洞。攻击者可利用该漏洞执行任意代码。以下产品和版本受到影响:基于Windows、macOS和Linux平台的Adobe Flash Player Desktop Runtime 31.0.0.153及之前版本,基于Windows、macOS、Linux和Chrome OS平台的Adobe Fl
Description
Flash sources for CVE-2018-15982 used by NK
Readme
# CVE-2018-15982
Flash sources for CVE-2018-15982 used by NK

this is a dump of a fully weaponized activex obj used by NK https://threatpost.com/adobe-patches-zero-day-vulnerability-in-flash-player/139629/

Payloads are in Class 6 and 7
File Snapshot

[4.0K] /data/pocs/54d94420f2bc70a700b8e5eaf8f3cf976dea1d3a ├── [ 587] Class0.as ├── [ 357] Class1.as ├── [ 185] Class2.as ├── [ 462] Class3.as ├── [ 220] Class4.as ├── [ 225] Class5.as ├── [ 200] Class6.as ├── [ 200] Class7.as ├── [2.9K] content2.fla ├── [ 23K] Main.as ├── [4.0K] mx │   └── [4.0K] core │   ├── [ 348] ByteArrayAsset.as │   ├── [ 76] IFlexAsset.as │   └── [ 104] mx_internal.as └── [ 237] README.md 2 directories, 14 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.