This document discusses ActionScript vulnerabilities in Adobe Flash Player. It begins by explaining that most Flash exploits target ActionScript-level vulnerabilities rather than memory corruptions. It then describes how inconsistencies between the verification flow and execution flow during just-in-time compilation can lead to vulnerabilities. Specifically, bytecode may pass verification but trigger issues during execution. This is known as an "atom confusion" situation where different data types are treated as the same. The document analyzes CVE-2010-3654 as a case study, simplifying the proof of concept to demonstrate how modifying a class reference caused an integer to be treated as an object.