First published: Thu Dec 10 2009(Updated: )
Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 on Windows allows remote attackers to obtain the names of local files via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4820.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
Adobe Adobe Air | <=1.5.2 | |
Adobe Adobe Air | =1.0 | |
Adobe Adobe Air | =1.0.1 | |
Adobe Adobe Air | =1.1 | |
Adobe Adobe Air | =1.5.1 | |
Adobe Flash Player | <=10.0.32.18 | |
Adobe Flash Player | =7.0 | |
Adobe Flash Player | =7.0.1 | |
Adobe Flash Player | =7.0.25 | |
Adobe Flash Player | =7.0.63 | |
Adobe Flash Player | =7.0.69.0 | |
Adobe Flash Player | =7.0.70.0 | |
Adobe Flash Player | =7.1 | |
Adobe Flash Player | =7.1.1 | |
Adobe Flash Player | =7.2 | |
Adobe Flash Player | =8 | |
Adobe Flash Player | =8 | |
Adobe Flash Player | =8.0 | |
Adobe Flash Player | =8.0 | |
Adobe Flash Player | =8.0 | |
Adobe Flash Player | =8.0.24.0 | |
Adobe Flash Player | =8.0.34.0 | |
Adobe Flash Player | =8.0.35.0 | |
Adobe Flash Player | =8.0.39.0 | |
Adobe Flash Player | =9.0 | |
Adobe Flash Player | =9.0.16 | |
Adobe Flash Player | =9.0.18d60 | |
Adobe Flash Player | =9.0.20 | |
Adobe Flash Player | =9.0.20.0 | |
Adobe Flash Player | =9.0.28 | |
Adobe Flash Player | =9.0.28.0 | |
Adobe Flash Player | =9.0.31 | |
Adobe Flash Player | =9.0.31.0 | |
Adobe Flash Player | =9.0.45.0 | |
Adobe Flash Player | =9.0.47.0 | |
Adobe Flash Player | =9.0.48.0 | |
Adobe Flash Player | =9.0.112.0 | |
Adobe Flash Player | =9.0.114.0 | |
Adobe Flash Player | =9.0.115.0 | |
Adobe Flash Player | =9.0.124.0 | |
Adobe Flash Player | =9.0.155.0 | |
Adobe Flash Player | =9.0.159.0 | |
Adobe Flash Player | =9.125.0 | |
Adobe Flash Player | =10.0.0.584 | |
Adobe Flash Player | =10.0.12.10 | |
Adobe Flash Player | =10.0.12.36 | |
Adobe Flash Player | =10.0.22.87 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.