Vulnerability Name: | CVE-2012-5882 (CCN-80117) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2012-10-30 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2012-10-30 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-04-21 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Cross-site scripting (XSS) vulnerability in the Flash component infrastructure in YUI 2.5.0 through 2.9.0 allows remote attackers to inject arbitrary web script or HTML via vectors related to uploader.swf, a similar issue to CVE-2010-4208. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-5882 Source: BID Type: UNKNOWN 56385 Source: CCN Type: BID-56385 YUI 'SWF' File Multiple Cross-Site Scripting Vulnerabilities Source: CCN Type: YUI Blog, October 30th, 2012 Security Announcement: SWF Vulnerability in YUI 2 Source: CONFIRM Type: UNKNOWN http://www.yuiblog.com/blog/2012/10/30/security-announcement-swf-vulnerability-in-yui-2/ Source: CONFIRM Type: UNKNOWN http://www.yuiblog.com/blog/2012/11/05/post-mortem-swf-vulnerability-in-yui-2/ Source: CONFIRM Type: Patch, Vendor Advisory http://yuilibrary.com/support/20121030-vulnerability/ Source: XF Type: UNKNOWN yui-flash-xss(80117) Source: CCN Type: IBM Security Bulletin 6252755 (License Metric Tool) Security vulnerabilities have been identified in BigFix Platform shipped with IBM License Metric Tool. Source: CCN Type: IBM Security Bulletin 6471895 (Security Verify Access Docker) Multiple Security vulnerabilities have been fixed in the IBM Security Verify Access Docker container | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |