CVE-2010-4209

Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.8.0 through 2.8.1, as used in Bugzilla 3.7.1 through 3.7.3 and 4.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to swfstore/swfstore.swf.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
http://secunia.com/advisories/41955 Vendor Advisory
http://secunia.com/advisories/42271
http://www.bugzilla.org/security/3.2.8/
http://www.openwall.com/lists/oss-security/2010/11/07/1
http://www.securityfocus.com/archive/1/514622
http://www.securityfocus.com/bid/44420
http://www.securitytracker.com/id?1024683
http://www.vupen.com/english/advisories/2010/2878 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2975
http://yuilibrary.com/support/2.8.2/ Patch Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
http://secunia.com/advisories/41955 Vendor Advisory
http://secunia.com/advisories/42271
http://www.bugzilla.org/security/3.2.8/
http://www.openwall.com/lists/oss-security/2010/11/07/1
http://www.securityfocus.com/archive/1/514622
http://www.securityfocus.com/bid/44420
http://www.securitytracker.com/id?1024683
http://www.vupen.com/english/advisories/2010/2878 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2975
http://yuilibrary.com/support/2.8.2/ Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:yahoo:yui:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:yahoo:yui:2.8.1:*:*:*:*:*:*:*
OR cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html -
References () http://secunia.com/advisories/41955 - Vendor Advisory () http://secunia.com/advisories/41955 - Vendor Advisory
References () http://secunia.com/advisories/42271 - () http://secunia.com/advisories/42271 -
References () http://www.bugzilla.org/security/3.2.8/ - () http://www.bugzilla.org/security/3.2.8/ -
References () http://www.openwall.com/lists/oss-security/2010/11/07/1 - () http://www.openwall.com/lists/oss-security/2010/11/07/1 -
References () http://www.securityfocus.com/archive/1/514622 - () http://www.securityfocus.com/archive/1/514622 -
References () http://www.securityfocus.com/bid/44420 - () http://www.securityfocus.com/bid/44420 -
References () http://www.securitytracker.com/id?1024683 - () http://www.securitytracker.com/id?1024683 -
References () http://www.vupen.com/english/advisories/2010/2878 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2878 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2975 - () http://www.vupen.com/english/advisories/2010/2975 -
References () http://yuilibrary.com/support/2.8.2/ - Patch, Vendor Advisory () http://yuilibrary.com/support/2.8.2/ - Patch, Vendor Advisory

Information

Published : 2010-11-07 22:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4209

Mitre link : CVE-2010-4209

CVE.ORG link : CVE-2010-4209


JSON object : View

Products Affected

yahoo

  • yui

mozilla

  • bugzilla
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')