CVE-2010-2274
Published Jun 15, 2010
Last updated 14 years ago
Overview
- Description
- Multiple open redirect vulnerabilities in Dojo 1.0.x before 1.0.3, 1.1.x before 1.1.2, 1.2.x before 1.2.4, 1.3.x before 1.3.3, and 1.4.x before 1.4.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, possibly related to dojo/resources/iframe_history.html, dojox/av/FLAudio.js, dojox/av/FLVideo.js, dojox/av/resources/audio.swf, dojox/av/resources/video.swf, util/buildscripts/jslib/build.js, util/buildscripts/jslib/buildUtil.js, and util/doh/runner.html.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B97B59B4-4B4C-4506-8FDF-FA6ADCE0D128" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03BC2181-EB91-4E3C-A8D1-EB10A8C931D9" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A01BDB4-3A20-4834-B9AA-712359938834" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F26DD9CB-1C3A-4C92-A012-86BBE1E02488" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A30618B0-5361-44E6-A92E-F37C2C597E2E" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1A83DF6-675C-4AFA-BABC-65C6E4C73215" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAA89367-3736-470C-9AB0-C2F3264837AC" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5116D8F-B46F-404A-804A-26EFD7FA1AFE" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB69EAEF-21A2-48D4-9A11-674A900E6B2C" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "111D0158-345D-45DD-81F5-51E4A95E61B9" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65D44E2A-CAED-4B16-AAF3-A3460341D1ED" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0587636C-C1CC-4F28-AD99-5C5DD6899337" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3DED8A3-F451-43EB-9FE1-F3AB5E935754" }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "078F33DC-B71C-4777-A1D6-313A82780592" } ], "operator": "OR" } ] } ]