CVE-2012-5883
Published Nov 16, 2012
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.8.0 through 2.9.0, as used in Bugzilla 3.7.x and 4.0.x before 4.0.9, 4.1.x and 4.2.x before 4.2.4, and 4.3.x and 4.4.x before 4.4rc1, allows remote attackers to inject arbitrary web script or HTML via vectors related to swfstore.swf, a similar issue to CVE-2010-4209.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8D0ED4E-F1A7-43B7-B9D2-D6D6AA145459" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93FE2861-A397-4439-9BB8-7B67D7F9D211" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF08887-66BF-4B3C-81E9-F8443E7D3285" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2D243D2-0FD9-45E5-BE52-A2956F587122" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6038EF72-2CDC-42A1-A20A-B23459776E21" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869" }, { "criteria": "cpe:2.3:a:yahoo:yui:2.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF48039A-91E3-46AB-9976-8E4B5F656B76" }, { "criteria": "cpe:2.3:a:yahoo:yui:2.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B573788D-91EB-42A9-8E25-11B8F8483638" }, { "criteria": "cpe:2.3:a:yahoo:yui:2.8.1:pr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE5171DD-4DD2-4E31-8AB3-79C3BF98631D" }, { "criteria": "cpe:2.3:a:yahoo:yui:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E123BE37-CAB5-4E39-A30A-FEE929D94B8E" }, { "criteria": "cpe:2.3:a:yahoo:yui:2.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15C1F0CF-A011-4299-8A9F-FE2B4005AAE5" }, { "criteria": "cpe:2.3:a:yahoo:yui:2.9.0:pr2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB27623-B6A3-46D8-93E3-D284E46FF38D" }, { "criteria": "cpe:2.3:a:yahoo:yui:2.9.0:pr4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "623A34B4-A44C-4B7A-B01E-18560D17659A" } ], "operator": "OR" } ] } ]