I just started seriously playing around with Metasploit, and a question kept coming into my mind.
In the case of Adobe Flash for example, there are thousands of Flash vulnerabilities in CVEdetails.com but only a couple of them are built-in exploits in Metasploit. Are these few exploits inteded for real use or only for demonstration purposes?
Besides, they all seem to have been patched by newer brower versions, almost all of them work only on IE (even if the Flash version is REALLY old in other navigators). Do real-life pentesters really work with such limitations?
Just to be clear, I'm not asking for ready to use exploits or scripts. After 10+ years of Windows/Linux coding, I'm really interested in learning the internals to create my own tools. So, I'm just asking for pointers on how real things are done, not the traditional pentesting books PoCs which seem to me like just some kind "Hello world" exploits.