Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-0313 PoC — Adobe Flash Player 任意代码执行漏洞

Source
Associated Vulnerability
Title:Adobe Flash Player 任意代码执行漏洞 (CVE-2015-0313)
Description:Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。 Adobe Flash Player中存在安全漏洞。远程攻击者可利用该漏洞执行任意代码。以下版本受到影响:基于Windows和OS X平台的Adobe Flash Player 16.0.0.296及之前版本和基于Linux平台的Adobe Flash Player 13.0.0.264及之前版本。
Readme
# CVE-2015-0313

Adobe Flash vulnerability source code (cve-2015-0313) from Angler Exploit Kit 

Reference: 
- http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-new-adobe-flash-zero-day-exploit-used-in-malvertisements/
- http://malware.dontneedcoffee.com/2015/02/cve-2015-0313-flash-up-to-1600296-and.html
- https://helpx.adobe.com/security/products/flash-player/apsa15-02.html
File Snapshot

[4.0K] /data/pocs/8eb12e9d332dac2859f8ddefe9d647b19312b0f0 ├── [ 311] Assets.as ├── [ 133] Assets_shader_class.as ├── [2.0K] Base64.as ├── [4.0K] com │   └── [4.0K] buraks │   └── [4.0K] utils │   └── [ 692] fastmem.as ├── [ 39K] Main.as ├── [4.0K] mx │   └── [4.0K] core │   ├── [ 219] ByteArrayAsset.as │   ├── [ 74] IFlexAsset.as │   └── [ 106] mx_internal.as ├── [ 409] README.md ├── [5.7K] Sha1.as ├── [3.3K] Shellcodes.as ├── [ 128] Shellcodes_raw.as └── [7.6K] Tools.as 5 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.