Show plain JSON{"id": "CVE-2010-2274", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-06-15T14:30:01.467", "references": [{"url": "http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/38964", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/40007", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21431472", "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833", "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849", "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856", "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896", "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932", "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958", "source": "cve@mitre.org"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2010/1281", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/38964", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/40007", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21431472", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/1281", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple open redirect vulnerabilities in Dojo 1.0.x before 1.0.3, 1.1.x before 1.1.2, 1.2.x before 1.2.4, 1.3.x before 1.3.3, and 1.4.x before 1.4.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, possibly related to dojo/resources/iframe_history.html, dojox/av/FLAudio.js, dojox/av/FLVideo.js, dojox/av/resources/audio.swf, dojox/av/resources/video.swf, util/buildscripts/jslib/build.js, util/buildscripts/jslib/buildUtil.js, and util/doh/runner.html."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de redirecci\u00f3n abierta en Dojo 1.0.x en versiones anteriores a la 1.0.3, 1.1.x en versiones anteriores a la 1.1.2, 1.2.x en versiones anteriores a la 1.2.4, 1.3.x en versiones anteriores a la 1.3.3 y 1.4.x en versiones anteriores a la 1.4.2 permiten a atacantes remotos redirigir usuarios a sitios web de su elecci\u00f3n y realizar ataques de phising mediante vectores desconocidos, posiblemente relacionados con dojo/resources/iframe_history.html, dojox/av/FLAudio.js, dojox/av/FLVideo.js, dojox/av/resources/audio.swf, dojox/av/resources/video.swf, util/buildscripts/jslib/build.js, util/buildscripts/jslib/buildUtil.js y util/doh/runner.html."}], "lastModified": "2024-11-21T01:16:17.767", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B97B59B4-4B4C-4506-8FDF-FA6ADCE0D128"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03BC2181-EB91-4E3C-A8D1-EB10A8C931D9"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A01BDB4-3A20-4834-B9AA-712359938834"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F26DD9CB-1C3A-4C92-A012-86BBE1E02488"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A30618B0-5361-44E6-A92E-F37C2C597E2E"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1A83DF6-675C-4AFA-BABC-65C6E4C73215"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAA89367-3736-470C-9AB0-C2F3264837AC"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5116D8F-B46F-404A-804A-26EFD7FA1AFE"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB69EAEF-21A2-48D4-9A11-674A900E6B2C"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "111D0158-345D-45DD-81F5-51E4A95E61B9"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65D44E2A-CAED-4B16-AAF3-A3460341D1ED"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0587636C-C1CC-4F28-AD99-5C5DD6899337"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3DED8A3-F451-43EB-9FE1-F3AB5E935754"}, {"criteria": "cpe:2.3:a:dojotoolkit:dojo:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "078F33DC-B71C-4777-A1D6-313A82780592"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}