Description
An unspecified function in the JavaScript implementation in Google Chrome creates and exposes a "temporary footprint" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an "in-session phishing attack." NOTE: as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
CVSS Metrics
- Vector
- AV:N/AC:H/Au:S/C:N/I:P/A:N
- Access Vector
- network
- Access Cmplx
- high
- Auth
- single
- Confidentiality
- none
- Integrity
- partial
- Availability
- none
- Weaknesses
- NVD-CWE-noinfo
Metadata
- Primary Vendor
- Published
- 1/20/2009
- Last Modified
- 4/9/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
google : chrome
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.