Show plain JSON{"id": "CVE-2010-4209", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-11-07T22:00:03.847", "references": [{"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html", "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html", "source": "cve@mitre.org"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/41955", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/42271", "source": "cve@mitre.org"}, {"url": "http://www.bugzilla.org/security/3.2.8/", "source": "cve@mitre.org"}, {"url": "http://www.openwall.com/lists/oss-security/2010/11/07/1", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/514622", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/44420", "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id?1024683", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2010/2878", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2010/2975", "source": "cve@mitre.org"}, {"url": "http://yuilibrary.com/support/2.8.2/", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/41955", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/42271", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.bugzilla.org/security/3.2.8/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2010/11/07/1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/514622", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/44420", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id?1024683", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/2878", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/2975", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://yuilibrary.com/support/2.8.2/", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.8.0 through 2.8.1, as used in Bugzilla 3.7.1 through 3.7.3 and 4.1, allows remote attackers to inject arbitrary web script or HTML via vectors related to swfstore/swfstore.swf."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la infraestructura del componente de Flash en YUI v2.8.0 hasta v2.8.1, tal como se emplea en Bugzilla v3.7.1 hasta v3.7.3 y v4.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante vectores relacionados con swfstore/swfstore.swf"}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:yahoo:yui:2.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF48039A-91E3-46AB-9976-8E4B5F656B76"}, {"criteria": "cpe:2.3:a:yahoo:yui:2.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B573788D-91EB-42A9-8E25-11B8F8483638"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657"}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}