CVE-2009-3731

N/A Unknown
Published: December 16, 2009 Modified: April 23, 2026
View on NVD

Description

Multiple cross-site scripting (XSS) vulnerabilities in WebWorks Help 2.0 through 5.0 in VMware vCenter 4.0 before Update 1 Build 208156; VMware Server 2.0.2; VMware ESX 4.0; VMware Lab Manager 2.x; VMware vCenter Lab Manager 3.x and 4.x before 4.0.1; VMware Stage Manager 1.x before 4.0.1; WebWorks Publisher 6.x through 8.x; WebWorks Publisher 2003; and WebWorks ePublisher 9.0.x through 9.3, 2008.1 through 2008.4, and 2009.x before 2009.3 allow remote attackers to inject arbitrary web script or HTML via (1) wwhelp_entry.html, reachable through index.html and wwhsec.htm, (2) wwhelp/wwhimpl/api.htm, (3) wwhelp/wwhimpl/common/html/frameset.htm, (4) wwhelp/wwhimpl/common/scripts/switch.js, or (5) the window.opener component in wwhelp/wwhimpl/common/html/bookmark.htm, related to (a) unspecified parameters and (b) messages used in topic links for the bookmarking functionality.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.osvdb.org/62738
Source: cve@mitre.org
http://www.osvdb.org/62739
Source: cve@mitre.org
http://www.osvdb.org/62740
Source: cve@mitre.org
http://www.osvdb.org/62741
Source: cve@mitre.org
http://www.osvdb.org/62742
Source: cve@mitre.org
http://www.securityfocus.com/bid/37346
Source: cve@mitre.org
Patch
http://www.webworks.com/Security/2009-0001/
Source: cve@mitre.org
Patch Vendor Advisory
http://archives.neohapsis.com/archives/bugtraq/2009-12/0229.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://lists.vmware.com/pipermail/security-announce/2009/000073.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/38749
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38842
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1023683
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/62738
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/62739
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/62740
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/62741
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/62742
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/509883/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/37346
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.webworks.com/Security/2009-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory

28 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.2%
84th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

webworks vmware microsoft