What happens when Flash is executed
Flash execute discovers URLs and potential vulnerabilities that might otherwise go unnoticed because they are embedded in a Flash file.
Graphical elements such
as movie clips, buttons, text fields found
in Flash files are examined for vulnerabilities. The scan follows
a path through the Flash screens by simulating screen button clicks.
It explores the graphical elements on each screen it encounters based
on various limits you provide, such as:
- Depth limit: The maximum length of a path the scan takes through the Flash file.
- Click limit: The maximum total of simulated screen button clicks the scan performs to explore a Flash file.
- Screen limit: The maximum number of screens the scan can visit. A screen is considered unique based on the graphical elements it displays (such as movie clips, buttons, text fields).
Note: If
clicking two different buttons brings you to the same
screen, this operation would count 1 towards the screen limit and
2 towards the click limit.