Show plain JSON{"id": "CVE-2010-5097", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-05-21T20:55:16.553", "references": [{"url": "http://secunia.com/advisories/35770", "source": "secalert@redhat.com"}, {"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2011/01/13/2", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/10/7", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/11/3", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/12/5", "source": "secalert@redhat.com"}, {"url": "http://www.osvdb.org/70123", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/45470", "source": "secalert@redhat.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64178", "source": "secalert@redhat.com"}, {"url": "http://secunia.com/advisories/35770", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2011/01/13/2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/10/7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/11/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/12/5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/70123", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/45470", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64178", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the click enlarge functionality in TYPO3 4.3.x before 4.3.9 and 4.4.x before 4.4.5 when the caching framework is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funcionalidad \"click enlarge\" de TYPO3 4.3.x anteriores a 4.3.9 y 4.4.x anteriores a 4.4.5. Cuando la plataforma de cach\u00e9 est\u00e1 habilitada, permite a atacantes remotos inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s de vectores sin especificar."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6066CFA2-202E-43A3-B1DF-36364ABD5A1A"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13C922A9-05A3-4D98-A568-F780CCA87E39"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44E9893A-2771-4C04-9F90-B10EE659088E"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31DA3600-C955-46B0-8BD9-C9B3FC0B81EC"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7ED0C04-33BA-4F9B-97B0-BB5D30C2A0D8"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E40CC0D-E7EF-4800-AC0B-5AF603B8BC6F"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16759F16-34C6-4C2C-BECB-12555EEEBDA3"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB331CC-3125-454E-BCBE-B85540B62110"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9B46AB0-D925-4E74-8D15-40EE3BC0B14A"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85F02502-5C03-4751-BC83-59F894400E7E"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9319A96-D510-47DB-9DBC-C16C0947E4C9"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40E0FDF1-E63C-48C9-98E2-55E3FD891882"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6D22400-E6A1-4C3A-B16F-E14672B86D14"}, {"criteria": "cpe:2.3:a:typo3:typo3:4.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DFA0996-4839-4FDB-9B9D-5F8424946F9A"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}