CVE-2008-4401
Published Oct 17, 2008
Last updated 6 years ago
Overview
- Description
- ActionScript in Adobe Flash Player 9.0.124.0 and earlier does not require user interaction in conjunction with (1) the FileReference.browse operation in the FileReference upload API or (2) the FileReference.download operation in the FileReference download API, which allows remote attackers to create a browse dialog box, and possibly have unspecified other impact, via an SWF file.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE43678F-7BFF-43EF-8968-B440E2BEF76F", "versionEndIncluding": "9.0.124.0" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0_r67:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB20235-B2F2-426E-B797-BFA361CEC488" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874" }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4" }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF" }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D" }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19" }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6" }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D" }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2" }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A" }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911" }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF" } ], "operator": "OR" } ] } ]