Flash Broker-Based Sandbox Escape via Unexpected Directory Lock
>> CATEGORY: Security
Flash Broker-Based Sandbox Escape via Unexpected Directory Lock
Flash AS2 Use After Free in TextField.filters
Flash Issues in DefineBitsLossless and DefineBitsLossless2 Leads to Using Uninitialized Memory
Flash PCRE Regex Compilation Zero-Length Assertion Arbitrary Bytecode Execution
Flash Uninitialized Stack Variable MPD Parsing Memory Corruption
Flash Broker-Based Sandbox Escape via Timing Attack Against File Moving
Flash AVSS.setSubscribedTags Use After Free Memory Corruption
Flash Broker-Based Sandbox Escape via Forward Slash Instead of Backslash
Flash Player Integer Overflow in Function.apply
Adobe Flash Use-After-Free in Drawing Methods “this”