Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:eclipse:eclipse_ide:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0C1BF21-969E-4678-93A9-77B9B498F2BA", "versionEndIncluding": "3.6.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A4885748-0EB1-40B1-B4AB-98E410126D71", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2ECF677E-6117-4F0E-A092-1A2188B2ABF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D063DE9-3338-474B-97C9-C2E4F296E5CE", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D86750B2-3009-4191-B691-7E066260515A", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "941AD1D7-680B-465C-B5B2-B6301560B97E", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DD3CF02-B949-4799-BB91-113A3CA41A7C", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "679006A3-7CC5-4D77-979C-8D22EDB4E4A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "66FA5EF5-86E2-4DA5-9E84-F3FC1EFCBBFF", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E39FDE00-59B9-428C-857B-10DBC6CAD937", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F4038314-44C4-40AE-A558-74073F15750D", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0837DD00-2778-4C34-99F4-4878FA537C16", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4C760BD-9E48-4EE5-93BA-8C1DC996B3AF", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "EC2A5188-7229-4B19-9786-62E39FBF036D", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "10102CF1-F461-413C-AA3A-092556B9BF01", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A5DD907-2A5A-4491-A517-2DDB34A580E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "EAD8B9BB-9568-44F4-9843-611FD6769AC6", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3F0EC0E-AA65-4F9B-8FDD-CE4B1B4ACF5E", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "5907C6D0-4EA3-4F8E-9E3A-0505BA53F261", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "873A33FA-FCF0-4007-94DE-523BF5842F0A", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D96F970-8948-4014-A18A-FA7C222C0B29", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "5875CD2E-E28B-48BE-92F0-3C34F713C558", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "E7F8DF44-0068-48A9-8E1A-7399581AC91E", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "0840E876-228B-4C85-BDF7-A4A38F16FBF4", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B0F3C49-D729-4F54-AD5B-F4667275828F", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A74B911F-50F3-4C4A-BE1F-F3E331E2F3EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "23E62335-6EDB-46CA-9502-0D013949BD0D", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A2A475BF-CEC9-4B0C-A9CF-FF5CD0198659", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:m1:*:*:*:*:*:*", "matchCriteriaId": "BF9561F4-FEA2-4A8F-A761-72F9C1D1E046", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:m2:*:*:*:*:*:*", "matchCriteriaId": "CB36BF12-8F04-4898-A31C-63031C99354F", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:m3:*:*:*:*:*:*", "matchCriteriaId": "07D83BF7-CF20-4898-B2D3-23B40D3F961D", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:m4:*:*:*:*:*:*", "matchCriteriaId": "80028C7A-F530-479E-8FD6-F3ADBBC2598C", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:m5:*:*:*:*:*:*", "matchCriteriaId": "74947CA6-5C06-4EB1-AF71-6A48AD25A84E", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:m6:*:*:*:*:*:*", "matchCriteriaId": "D1FF765B-13AA-4B3D-8B8C-BF41EFCD203C", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:m7:*:*:*:*:*:*", "matchCriteriaId": "95696770-BE8F-4D86-AEF4-A7102F154898", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "0E740A0E-B314-4A01-9AB8-17B4EE45D4E9", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:rc2:*:*:*:*:*:*", "matchCriteriaId": "3E784581-98AC-4341-B06F-3B861F313708", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:rc3:*:*:*:*:*:*", "matchCriteriaId": "871833EE-1CA1-4258-97B2-748ACD760AA8", "vulnerable": true}, {"criteria": "cpe:2.3:a:eclipse:eclipse_ide:3.6:rc4:*:*:*:*:*:*", "matchCriteriaId": "7DCF21CF-8984-4C3A-BD30-BD7CDA188C35", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Help Contents web application (aka the Help Server) in Eclipse IDE before 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) help/index.jsp or (2) help/advanced/content.jsp."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Help Contents web (tambi\u00e9n conocido como Help Server), permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante el query string a (1) help/index.jsp o (2) help/advanced/content.jsp"}], "id": "CVE-2010-4647", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-01-13T19:00:04.917", "references": [{"source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052532.html"}, {"source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052554.html"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/01/06/16"}, {"source": "secalert@redhat.com", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/01/06/7"}, {"source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:032"}, {"source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0568.html"}, {"source": "secalert@redhat.com", "url": "http://yehg.net/lab/pr0js/advisories/eclipse/%5Beclipse_help_server%5D_cross_site_scripting"}, {"source": "secalert@redhat.com", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=329582"}, {"source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64833"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052532.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052554.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/01/06/16"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://openwall.com/lists/oss-security/2011/01/06/7"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:032"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0568.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://yehg.net/lab/pr0js/advisories/eclipse/%5Beclipse_help_server%5D_cross_site_scripting"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=329582"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64833"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}