Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Name CVE-2010-4524 First vendor Publication 2011-01-03
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in MHonArc 2.6.16 allows remote attackers to inject arbitrary web script or HTML via a malformed start tag and end tag for a SCRIPT element, as demonstrated by ipt> and ipt> sequences.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4524

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Application 1

OpenVAS Exploits

Date Description
2011-03-25 Name : Fedora Update for mhonarc FEDORA-2011-3357
File : nvt/gb_fedora_2011_3357_mhonarc_fc13.nasl
2011-03-25 Name : Fedora Update for mhonarc FEDORA-2011-3390
File : nvt/gb_fedora_2011_3390_mhonarc_fc14.nasl
2011-01-14 Name : Mandriva Update for MHonArc MDVSA-2011:003 (MHonArc)
File : nvt/gb_mandriva_MDVSA_2011_003.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70085 MHonArc lib/mhtxthtml.pl HTML Email Conversion XSS

MHonArc contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application contains the 'lib/mhtxthtml.pl' script which does not properly convert HTML e-mails with malformed HTML tags of the form '<scr<body>ipt>'. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2011-03-24 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3357.nasl - Type : ACT_GATHER_INFO
2011-03-24 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3390.nasl - Type : ACT_GATHER_INFO
2011-03-21 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3344.nasl - Type : ACT_GATHER_INFO
2011-01-28 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2011-003.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/45528
CONFIRM http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693
MANDRIVA http://lists.mandriva.com/security-announce/2011-01/msg00004.php
MISC http://www.mail-archive.com/mhonarc-dev%40mhonarc.org/msg01296.html
MLIST http://openwall.com/lists/oss-security/2010/12/21/4
SECUNIA http://secunia.com/advisories/42694
VUPEN http://www.vupen.com/english/advisories/2010/3344

Alert History

If you want to see full details history, please login or register.
Date Informations
2023-02-13 09:29:02
  • Multiple Updates
2021-05-04 12:13:13
  • Multiple Updates
2021-04-22 01:13:37
  • Multiple Updates
2020-05-23 00:27:03
  • Multiple Updates
2018-07-13 01:03:42
  • Multiple Updates
2016-04-26 20:17:26
  • Multiple Updates
2014-02-17 10:58:57
  • Multiple Updates
2013-05-10 23:38:38
  • Multiple Updates