CVE-2010-424528.10.2019, 15:15pootle 2.0.5 has XSS via 'match_names' parameterCross-site ScriptingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST6.1 MEDIUMNETWORKLOWNONECVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NredhatCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 56%VendorProductVersiontranslatehousepootle𝑥≤ 2.0.5-0.2𝑥= Vulnerable software versionsUbuntu ReleasesUbuntu ProductCodenamepootlesaucydneraringdnequantaldneprecisedneoneiricignorednattyignoredlucidignoredhardyignoredKnown Exploits!https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4245https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4245Common Weakness EnumerationCWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Referenceshttps://access.redhat.com/security/cve/cve-2010-4245https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=604060https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4245https://security-tracker.debian.org/tracker/CVE-2010-4245https://access.redhat.com/security/cve/cve-2010-4245https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=604060https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4245https://security-tracker.debian.org/tracker/CVE-2010-4245