Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-7855 PoC — Adobe Flash Player 远程代码执行漏洞

Source
Associated Vulnerability
Title:Adobe Flash Player 远程代码执行漏洞 (CVE-2016-7855)
Description:Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。 Adobe Flash Player中存在远程代码执行漏洞。攻击者可利用该漏洞控制受影响的系统。以下产品和版本受到影响:基于Windows和Macintosh平台上的Adobe Flash Player Desktop Runtime 23.0.0.185及之前的版本,基于Windows、Macintosh、Linux和Chrome OS平台上的
Description
Check the Browser's FlashPlayer version to check if it is vulnerable to exploit CVE-2016-7855
Readme
# CheckFlashPlayerVersion
Check the Browser's FlashPlayer version to check if it is vulnerable to exploit CVE-2016-7855

# Usage:

Clone this repository and then open the html file in the browser where you want to check the Flash Player version
File Snapshot

[4.0K] /data/pocs/8537142f5b8a5d23677d9081a43d42ab7e974f5c ├── [ 824] checkFlashVersion.html ├── [ 245] README.md └── [ 33K] swfobject.js 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.