CVE-2010-2179

Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, when Firefox or Chrome is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to URL parsing.
References
Link Resource
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 Third Party Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html Third Party Advisory
http://secunia.com/advisories/40144 Broken Link
http://secunia.com/advisories/40545 Broken Link
http://secunia.com/advisories/43026 Broken Link
http://security.gentoo.org/glsa/glsa-201101-09.xml Third Party Advisory
http://securitytracker.com/id?1024085 Third Party Advisory VDB Entry
http://securitytracker.com/id?1024086 Broken Link VDB Entry
http://support.apple.com/kb/HT4435 Broken Link
http://www.adobe.com/support/security/bulletins/apsb10-14.html Broken Link Patch Third Party Advisory Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0464.html Broken Link Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0470.html Broken Link Third Party Advisory
http://www.securityfocus.com/bid/40759 Broken Link VDB Entry
http://www.securityfocus.com/bid/40808 Broken Link VDB Entry
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt Broken Link
http://www.us-cert.gov/cas/techalerts/TA10-162A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2010/1421 Broken Link
http://www.vupen.com/english/advisories/2010/1432 Broken Link
http://www.vupen.com/english/advisories/2010/1434 Broken Link
http://www.vupen.com/english/advisories/2010/1453 Broken Link
http://www.vupen.com/english/advisories/2010/1482 Broken Link
http://www.vupen.com/english/advisories/2010/1522 Broken Link
http://www.vupen.com/english/advisories/2010/1793 Broken Link
http://www.vupen.com/english/advisories/2011/0192 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/59328 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7126 Broken Link
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
OR cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
OR cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*

History

15 Sep 2022, 13:29

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2011/0192 - (VUPEN) http://www.vupen.com/english/advisories/2011/0192 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-201101-09.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201101-09.xml - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2010/1482 - (VUPEN) http://www.vupen.com/english/advisories/2010/1482 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/59328 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/59328 - Third Party Advisory, VDB Entry
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7126 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7126 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0464.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0464.html - Broken Link, Third Party Advisory
References (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb10-14.html - Patch, Vendor Advisory (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb10-14.html - Broken Link, Patch, Third Party Advisory, Vendor Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0470.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0470.html - Broken Link, Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2010/1522 - (VUPEN) http://www.vupen.com/english/advisories/2010/1522 - Broken Link
References (SECUNIA) http://secunia.com/advisories/43026 - (SECUNIA) http://secunia.com/advisories/43026 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2010/1421 - (VUPEN) http://www.vupen.com/english/advisories/2010/1421 - Broken Link
References (SECUNIA) http://secunia.com/advisories/40545 - (SECUNIA) http://secunia.com/advisories/40545 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2010/1453 - (VUPEN) http://www.vupen.com/english/advisories/2010/1453 - Broken Link
References (SECTRACK) http://securitytracker.com/id?1024085 - (SECTRACK) http://securitytracker.com/id?1024085 - Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2010/1793 - (VUPEN) http://www.vupen.com/english/advisories/2010/1793 - Broken Link
References (SECUNIA) http://secunia.com/advisories/40144 - (SECUNIA) http://secunia.com/advisories/40144 - Broken Link
References (BID) http://www.securityfocus.com/bid/40759 - (BID) http://www.securityfocus.com/bid/40759 - Broken Link, VDB Entry
References (BID) http://www.securityfocus.com/bid/40808 - (BID) http://www.securityfocus.com/bid/40808 - Broken Link, VDB Entry
References (SECTRACK) http://securitytracker.com/id?1024086 - (SECTRACK) http://securitytracker.com/id?1024086 - Broken Link, VDB Entry
References (HP) http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - (HP) http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2010/1434 - (VUPEN) http://www.vupen.com/english/advisories/2010/1434 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2010/1432 - (VUPEN) http://www.vupen.com/english/advisories/2010/1432 - Broken Link
References (APPLE) http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - (APPLE) http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Mailing List, Third Party Advisory
References (CERT) http://www.us-cert.gov/cas/techalerts/TA10-162A.html - US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA10-162A.html - Third Party Advisory, US Government Resource
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html - Third Party Advisory
References (CONFIRM) http://support.apple.com/kb/HT4435 - (CONFIRM) http://support.apple.com/kb/HT4435 - Broken Link
References (TURBO) http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt - (TURBO) http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt - Broken Link

Information

Published : 2010-06-15 18:00

Updated : 2023-12-10 11:03


NVD link : CVE-2010-2179

Mitre link : CVE-2010-2179

CVE.ORG link : CVE-2010-2179


JSON object : View

Products Affected

google

  • chrome

adobe

  • air
  • flash_player

mozilla

  • firefox
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')