Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2010-2275
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-15 Jun, 2010 | 14:30
Updated At-11 Apr, 2025 | 00:51

Cross-site scripting (XSS) vulnerability in dijit/tests/_testCommon.js in Dojo Toolkit SDK before 1.4.2 allows remote attackers to inject arbitrary web script or HTML via the theme parameter, as demonstrated by an attack against dijit/tests/form/test_Button.html.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>Versions up to 1.4.1(inclusive)
cpe:2.3:a:dojotoolkit:dojo:*:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.1.0
cpe:2.3:a:dojotoolkit:dojo:0.1.0:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.2.0
cpe:2.3:a:dojotoolkit:dojo:0.2.0:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.2.1
cpe:2.3:a:dojotoolkit:dojo:0.2.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.2.2
cpe:2.3:a:dojotoolkit:dojo:0.2.2:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.3.0
cpe:2.3:a:dojotoolkit:dojo:0.3.0:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.3.1
cpe:2.3:a:dojotoolkit:dojo:0.3.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.4.0
cpe:2.3:a:dojotoolkit:dojo:0.4.0:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.4.1
cpe:2.3:a:dojotoolkit:dojo:0.4.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.4.2
cpe:2.3:a:dojotoolkit:dojo:0.4.2:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.4.3
cpe:2.3:a:dojotoolkit:dojo:0.4.3:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.9.0
cpe:2.3:a:dojotoolkit:dojo:0.9.0:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>0.9.0
cpe:2.3:a:dojotoolkit:dojo:0.9.0:beta:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.0
cpe:2.3:a:dojotoolkit:dojo:1.0:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.0.1
cpe:2.3:a:dojotoolkit:dojo:1.0.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.0.2
cpe:2.3:a:dojotoolkit:dojo:1.0.2:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.1
cpe:2.3:a:dojotoolkit:dojo:1.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.1.1
cpe:2.3:a:dojotoolkit:dojo:1.1.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.2
cpe:2.3:a:dojotoolkit:dojo:1.2:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.2.1
cpe:2.3:a:dojotoolkit:dojo:1.2.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.2.2
cpe:2.3:a:dojotoolkit:dojo:1.2.2:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.2.3
cpe:2.3:a:dojotoolkit:dojo:1.2.3:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.3
cpe:2.3:a:dojotoolkit:dojo:1.3:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.3.1
cpe:2.3:a:dojotoolkit:dojo:1.3.1:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.3.2
cpe:2.3:a:dojotoolkit:dojo:1.3.2:*:*:*:*:*:*:*
Dojo (OpenJS Foundation)
dojotoolkit
>>dojo>>1.4
cpe:2.3:a:dojotoolkit:dojo:1.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.dojotoolkit.org/ticket/10773cve@mitre.org
Exploit
http://secunia.com/advisories/38964cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/40007cve@mitre.org
Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21431472cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958cve@mitre.org
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994cve@mitre.org
N/A
http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2010/1281cve@mitre.org
Vendor Advisory
http://bugs.dojotoolkit.org/ticket/10773af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/38964af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/40007af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21431472af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2010/1281af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Change History
0Changes found

Details not found