CVE-2010-4207

Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.4.0 through 2.8.1, as used in Bugzilla, Moodle, and other products, allows remote attackers to inject arbitrary web script or HTML via vectors related to charts/assets/charts.swf.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
http://moodle.org/mod/forum/discuss.php?d=160910
http://secunia.com/advisories/41955 Vendor Advisory
http://secunia.com/advisories/42271
http://www.bugzilla.org/security/3.2.8/
http://www.openwall.com/lists/oss-security/2010/11/07/1
http://www.securityfocus.com/archive/1/514622
http://www.securityfocus.com/bid/44420
http://www.securitytracker.com/id?1024683
http://www.vupen.com/english/advisories/2010/2878 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2975
http://yuilibrary.com/support/2.8.2/ Patch Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
http://moodle.org/mod/forum/discuss.php?d=160910
http://secunia.com/advisories/41955 Vendor Advisory
http://secunia.com/advisories/42271
http://www.bugzilla.org/security/3.2.8/
http://www.openwall.com/lists/oss-security/2010/11/07/1
http://www.securityfocus.com/archive/1/514622
http://www.securityfocus.com/bid/44420
http://www.securitytracker.com/id?1024683
http://www.vupen.com/english/advisories/2010/2878 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2975
http://yuilibrary.com/support/2.8.2/ Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:yahoo:yui:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.8.1:*:*:*:*:*:*:*
OR cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html -
References () http://moodle.org/mod/forum/discuss.php?d=160910 - () http://moodle.org/mod/forum/discuss.php?d=160910 -
References () http://secunia.com/advisories/41955 - Vendor Advisory () http://secunia.com/advisories/41955 - Vendor Advisory
References () http://secunia.com/advisories/42271 - () http://secunia.com/advisories/42271 -
References () http://www.bugzilla.org/security/3.2.8/ - () http://www.bugzilla.org/security/3.2.8/ -
References () http://www.openwall.com/lists/oss-security/2010/11/07/1 - () http://www.openwall.com/lists/oss-security/2010/11/07/1 -
References () http://www.securityfocus.com/archive/1/514622 - () http://www.securityfocus.com/archive/1/514622 -
References () http://www.securityfocus.com/bid/44420 - () http://www.securityfocus.com/bid/44420 -
References () http://www.securitytracker.com/id?1024683 - () http://www.securitytracker.com/id?1024683 -
References () http://www.vupen.com/english/advisories/2010/2878 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2878 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2975 - () http://www.vupen.com/english/advisories/2010/2975 -
References () http://yuilibrary.com/support/2.8.2/ - Patch, Vendor Advisory () http://yuilibrary.com/support/2.8.2/ - Patch, Vendor Advisory

Information

Published : 2010-11-07 22:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4207

Mitre link : CVE-2010-4207

CVE.ORG link : CVE-2010-4207


JSON object : View

Products Affected

moodle

  • moodle

yahoo

  • yui

mozilla

  • bugzilla
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')