This document summarizes potential vulnerabilities in Adobe Flash Player 9 that could allow a malicious SWF file to bypass the same-origin policy and control a victim's web browser. It describes how the Flash Player Socket class could be used to perform port scanning or relay sockets without permission. It also explains how DNS spoofing could trick the Flash Player into granting a SWF file access to a different domain. An actual malware program called "FlashBot" is presented that leverages these techniques to turn infected browsers into a botnet to perform tasks instructed by a command and control server. Workarounds like disabling Flash or using a firewall are suggested to prevent exploitation.