What happens when Flash is executed

Flash execute discovers URLs and potential vulnerabilities that might otherwise go unnoticed because they are embedded in a Flash file.

Graphical elements such as movie clips, buttons, text fields found in Flash files are examined for vulnerabilities. The scan follows a path through the Flash screens by simulating screen button clicks. It explores the graphical elements on each screen it encounters based on various limits you provide, such as:
  • Depth limit: The maximum length of a path the scan takes through the Flash file.
  • Click limit: The maximum total of simulated screen button clicks the scan performs to explore a Flash file.
  • Screen limit: The maximum number of screens the scan can visit. A screen is considered unique based on the graphical elements it displays (such as movie clips, buttons, text fields).
Note: If clicking two different buttons brings you to the same screen, this operation would count 1 towards the screen limit and 2 towards the click limit.