Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C8D0ED4E-F1A7-43B7-B9D2-D6D6AA145459", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "93FE2861-A397-4439-9BB8-7B67D7F9D211", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3AF08887-66BF-4B3C-81E9-F8443E7D3285", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D2D243D2-0FD9-45E5-BE52-A2956F587122", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "6038EF72-2CDC-42A1-A20A-B23459776E21", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50", "vulnerable": true}, {"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869", "vulnerable": true}, {"criteria": "cpe:2.3:a:yahoo:yui:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF48039A-91E3-46AB-9976-8E4B5F656B76", "vulnerable": true}, {"criteria": "cpe:2.3:a:yahoo:yui:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B573788D-91EB-42A9-8E25-11B8F8483638", "vulnerable": true}, {"criteria": "cpe:2.3:a:yahoo:yui:2.8.1:pr1:*:*:*:*:*:*", "matchCriteriaId": "EE5171DD-4DD2-4E31-8AB3-79C3BF98631D", "vulnerable": true}, {"criteria": "cpe:2.3:a:yahoo:yui:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E123BE37-CAB5-4E39-A30A-FEE929D94B8E", "vulnerable": true}, {"criteria": "cpe:2.3:a:yahoo:yui:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "15C1F0CF-A011-4299-8A9F-FE2B4005AAE5", "vulnerable": true}, {"criteria": "cpe:2.3:a:yahoo:yui:2.9.0:pr2:*:*:*:*:*:*", "matchCriteriaId": "7AB27623-B6A3-46D8-93E3-D284E46FF38D", "vulnerable": true}, {"criteria": "cpe:2.3:a:yahoo:yui:2.9.0:pr4:*:*:*:*:*:*", "matchCriteriaId": "623A34B4-A44C-4B7A-B01E-18560D17659A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.8.0 through 2.9.0, as used in Bugzilla 3.7.x and 4.0.x before 4.0.9, 4.1.x and 4.2.x before 4.2.4, and 4.3.x and 4.4.x before 4.4rc1, allows remote attackers to inject arbitrary web script or HTML via vectors related to swfstore.swf, a similar issue to CVE-2010-4209."}, {"lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en la infraestructura del componente Flash en YUI v2.8.0 a v2.9.0 tal y como se usa en Bugzilla v3.7.x y v4.0.x antes de v4.0.9, v4.1.x y v4.2.x antes de v4.2.4 y v4.3.x y v4.4.x antes de v4.4rc1, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores relacionados con swfstore.swf. Se trata de un problema similar a CVE-2010-4209.\r\n"}], "id": "CVE-2012-5883", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2012-11-16T12:24:24.900", "references": [{"source": "cve@mitre.org", "url": "http://www.bugzilla.org/security/3.6.11/"}, {"source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:066"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/56385"}, {"source": "cve@mitre.org", "url": "http://www.yuiblog.com/blog/2012/10/30/security-announcement-swf-vulnerability-in-yui-2/"}, {"source": "cve@mitre.org", "url": "http://www.yuiblog.com/blog/2012/11/05/post-mortem-swf-vulnerability-in-yui-2/"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://yuilibrary.com/support/20121030-vulnerability/"}, {"source": "cve@mitre.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=808845"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80116"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.bugzilla.org/security/3.6.11/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:066"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56385"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.yuiblog.com/blog/2012/10/30/security-announcement-swf-vulnerability-in-yui-2/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.yuiblog.com/blog/2012/11/05/post-mortem-swf-vulnerability-in-yui-2/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://yuilibrary.com/support/20121030-vulnerability/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=808845"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80116"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}