{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2010-1618","title":"Title"},{"category":"description","text":"Cross-site scripting (XSS) vulnerability in the phpCAS client library before 1.1.0, as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, which is not properly handled in an error message.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2010-1618","url":"https://www.suse.com/security/cve/CVE-2010-1618"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 591850 for CVE-2010-1618","url":"https://bugzilla.suse.com/591850"},{"category":"external","summary":"Advisory link for SUSE-SR:2010:011","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ACBTGUNJ6CTYWLVUTLYEKQX3ERY3PSCW/#ACBTGUNJ6CTYWLVUTLYEKQX3ERY3PSCW"}],"title":"SUSE CVE CVE-2010-1618","tracking":{"current_release_date":"2023-12-09T03:34:02Z","generator":{"date":"2023-02-15T05:59:27Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2010-1618","initial_release_date":"2023-02-15T05:59:27Z","revision_history":[{"date":"2023-02-15T05:59:27Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:10:50Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:34:02Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}