All the vulnerabilites related to monster_menus_module_project - monster_menus
cve-2013-4229
Vulnerability from cvelistv5
Published
2013-08-21 14:00
Modified
2024-08-06 16:38
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Monster Menus module 7.x-1.x before 7.x-1.12 for Drupal allows remote authenticated users with permissions to add pages to inject arbitrary web script or HTML via a title in the page settings.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "61710",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61710"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2059823"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2059789"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE request for Drupal contributed modules",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
          },
          {
            "name": "drupal-monstermenus-title-xss(86327)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86327"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupalcode.org/project/monster_menus.git/blobdiff/4841dcb4e36bdc74efe4ae2459637029df929940..4adcb6b:/mm_static.inc"
          },
          {
            "name": "54391",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54391"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-08-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Monster Menus module 7.x-1.x before 7.x-1.12 for Drupal allows remote authenticated users with permissions to add pages to inject arbitrary web script or HTML via a title in the page settings."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "61710",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61710"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://drupal.org/node/2059823"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://drupal.org/node/2059789"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE request for Drupal contributed modules",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
        },
        {
          "name": "drupal-monstermenus-title-xss(86327)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86327"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupalcode.org/project/monster_menus.git/blobdiff/4841dcb4e36bdc74efe4ae2459637029df929940..4adcb6b:/mm_static.inc"
        },
        {
          "name": "54391",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54391"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4229",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Monster Menus module 7.x-1.x before 7.x-1.12 for Drupal allows remote authenticated users with permissions to add pages to inject arbitrary web script or HTML via a title in the page settings."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "61710",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61710"
            },
            {
              "name": "https://drupal.org/node/2059823",
              "refsource": "MISC",
              "url": "https://drupal.org/node/2059823"
            },
            {
              "name": "https://drupal.org/node/2059789",
              "refsource": "CONFIRM",
              "url": "https://drupal.org/node/2059789"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE request for Drupal contributed modules",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
            },
            {
              "name": "drupal-monstermenus-title-xss(86327)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86327"
            },
            {
              "name": "http://drupalcode.org/project/monster_menus.git/blobdiff/4841dcb4e36bdc74efe4ae2459637029df929940..4adcb6b:/mm_static.inc",
              "refsource": "CONFIRM",
              "url": "http://drupalcode.org/project/monster_menus.git/blobdiff/4841dcb4e36bdc74efe4ae2459637029df929940..4adcb6b:/mm_static.inc"
            },
            {
              "name": "54391",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54391"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4229",
    "datePublished": "2013-08-21T14:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:38:01.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-8095
Vulnerability from cvelistv5
Published
2015-11-09 16:00
Modified
2024-09-16 23:06
Severity ?
Summary
The recycle bin feature in the Monster Menus module 7.x-1.21 before 7.x-1.24 for Drupal does not properly remove nodes from view, which allows remote attackers to obtain sensitive information via an unspecified URL pattern.
References
https://www.drupal.org/node/2608414x_refsource_MISC
https://www.drupal.org/node/2608382x_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:13:30.958Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/node/2608414"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/node/2608382"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The recycle bin feature in the Monster Menus module 7.x-1.21 before 7.x-1.24 for Drupal does not properly remove nodes from view, which allows remote attackers to obtain sensitive information via an unspecified URL pattern."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-11-09T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.drupal.org/node/2608414"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.drupal.org/node/2608382"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8095",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The recycle bin feature in the Monster Menus module 7.x-1.21 before 7.x-1.24 for Drupal does not properly remove nodes from view, which allows remote attackers to obtain sensitive information via an unspecified URL pattern."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.drupal.org/node/2608414",
              "refsource": "MISC",
              "url": "https://www.drupal.org/node/2608414"
            },
            {
              "name": "https://www.drupal.org/node/2608382",
              "refsource": "CONFIRM",
              "url": "https://www.drupal.org/node/2608382"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8095",
    "datePublished": "2015-11-09T16:00:00Z",
    "dateReserved": "2015-11-09T00:00:00Z",
    "dateUpdated": "2024-09-16T23:06:27.331Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4230
Vulnerability from cvelistv5
Published
2013-08-21 14:00
Modified
2024-08-06 16:38
Severity ?
Summary
The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the "Who can read data submitted to this webform" permission to delete arbitrary submissions via unspecified vectors.
References
https://drupal.org/node/2059807x_refsource_CONFIRM
https://drupal.org/node/2059823x_refsource_MISC
http://www.securityfocus.com/bid/61711vdb-entry, x_refsource_BID
http://www.openwall.com/lists/oss-security/2013/08/10/1mailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/86326vdb-entry, x_refsource_XF
https://drupal.org/node/2059805x_refsource_CONFIRM
http://secunia.com/advisories/54391third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.686Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2059807"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2059823"
          },
          {
            "name": "61711",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61711"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE request for Drupal contributed modules",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
          },
          {
            "name": "monstermenus-mmwebform-security-bypass(86326)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2059805"
          },
          {
            "name": "54391",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54391"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-08-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the \"Who can read data submitted to this webform\" permission to delete arbitrary submissions via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://drupal.org/node/2059807"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://drupal.org/node/2059823"
        },
        {
          "name": "61711",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61711"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE request for Drupal contributed modules",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
        },
        {
          "name": "monstermenus-mmwebform-security-bypass(86326)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://drupal.org/node/2059805"
        },
        {
          "name": "54391",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54391"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4230",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the \"Who can read data submitted to this webform\" permission to delete arbitrary submissions via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://drupal.org/node/2059807",
              "refsource": "CONFIRM",
              "url": "https://drupal.org/node/2059807"
            },
            {
              "name": "https://drupal.org/node/2059823",
              "refsource": "MISC",
              "url": "https://drupal.org/node/2059823"
            },
            {
              "name": "61711",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61711"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE request for Drupal contributed modules",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
            },
            {
              "name": "monstermenus-mmwebform-security-bypass(86326)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326"
            },
            {
              "name": "https://drupal.org/node/2059805",
              "refsource": "CONFIRM",
              "url": "https://drupal.org/node/2059805"
            },
            {
              "name": "54391",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54391"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4230",
    "datePublished": "2013-08-21T14:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:38:01.686Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4504
Vulnerability from cvelistv5
Published
2014-05-13 15:00
Modified
2024-08-06 16:45
Severity ?
Summary
The Monster Menus module 7.x-1.x before 7.x-1.15 allows remote attackers to read arbitrary node comments via a crafted URL.
References
https://drupal.org/node/2123287x_refsource_CONFIRM
https://drupal.org/node/2124289x_refsource_MISC
http://seclists.org/oss-sec/2013/q4/210mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.832Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2123287"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2124289"
          },
          {
            "name": "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/210"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Monster Menus module 7.x-1.x before 7.x-1.15 allows remote attackers to read arbitrary node comments via a crafted URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-13T14:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://drupal.org/node/2123287"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://drupal.org/node/2124289"
        },
        {
          "name": "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/210"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4504",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Monster Menus module 7.x-1.x before 7.x-1.15 allows remote attackers to read arbitrary node comments via a crafted URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://drupal.org/node/2123287",
              "refsource": "CONFIRM",
              "url": "https://drupal.org/node/2123287"
            },
            {
              "name": "https://drupal.org/node/2124289",
              "refsource": "MISC",
              "url": "https://drupal.org/node/2124289"
            },
            {
              "name": "[oss-security] 20131103 Re: CVE request for Drupal contributed modules",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q4/210"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4504",
    "datePublished": "2014-05-13T15:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.832Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-08-21 14:55
Modified
2024-11-21 01:55
Severity ?
Summary
The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the "Who can read data submitted to this webform" permission to delete arbitrary submissions via unspecified vectors.
Impacted products
Vendor Product Version
monster_menus_module_project monster_menus 6.x-6.19
monster_menus_module_project monster_menus 6.x-6.22
monster_menus_module_project monster_menus 6.x-6.23
monster_menus_module_project monster_menus 6.x-6.24
monster_menus_module_project monster_menus 6.x-6.25
monster_menus_module_project monster_menus 6.x-6.26
monster_menus_module_project monster_menus 6.x-6.27
monster_menus_module_project monster_menus 6.x-6.29
monster_menus_module_project monster_menus 6.x-6.30
monster_menus_module_project monster_menus 6.x-6.31
monster_menus_module_project monster_menus 6.x-6.32
monster_menus_module_project monster_menus 6.x-6.33
monster_menus_module_project monster_menus 6.x-6.34
monster_menus_module_project monster_menus 6.x-6.35
monster_menus_module_project monster_menus 6.x-6.36
monster_menus_module_project monster_menus 6.x-6.37
monster_menus_module_project monster_menus 6.x-6.38
monster_menus_module_project monster_menus 6.x-6.41
monster_menus_module_project monster_menus 6.x-6.42
monster_menus_module_project monster_menus 6.x-6.43
monster_menus_module_project monster_menus 6.x-6.44
monster_menus_module_project monster_menus 6.x-6.48
monster_menus_module_project monster_menus 6.x-6.53
monster_menus_module_project monster_menus 6.x-6.56
monster_menus_module_project monster_menus 6.x-6.57
monster_menus_module_project monster_menus 6.x-6.59
monster_menus_module_project monster_menus 6.x-6.60
monster_menus_module_project monster_menus 7.x-1.0
monster_menus_module_project monster_menus 7.x-1.1
monster_menus_module_project monster_menus 7.x-1.2
monster_menus_module_project monster_menus 7.x-1.3
monster_menus_module_project monster_menus 7.x-1.4
monster_menus_module_project monster_menus 7.x-1.5
monster_menus_module_project monster_menus 7.x-1.6
monster_menus_module_project monster_menus 7.x-1.7
monster_menus_module_project monster_menus 7.x-1.8
monster_menus_module_project monster_menus 7.x-1.9
monster_menus_module_project monster_menus 7.x-1.10
monster_menus_module_project monster_menus 7.x-1.11
monster_menus_module_project monster_menus 7.x-1.12
monster_menus_module_project monster_menus 7.x-1.x
drupal drupal -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E033DF-59CF-498C-A076-BA7DB686188E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9C16607-683F-40FC-AA48-012E3E1E83DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA037CFC-79F0-482F-A320-A0FA7EF007F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BE24CD-79B4-4AD0-963A-7A76E69BDAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BE243-196E-4391-A390-60BF9CD8A13B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "47FE3A7B-DA7C-4397-819C-1C7E4FB899E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ABEDF32-312E-424B-97E6-6B8DB0813999",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DAE4DF9-F3C0-4A9B-A4A9-CF77B8B47A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC407A9-65B4-4E51-892D-30F9F29E8D15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "03A129F5-769D-4A66-B0E8-BE59623780FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCE21E-4166-4C6B-860F-4359E46368CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10A3425-FA1F-4BB0-925A-1D014A62F819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD4080C-CE70-40B4-B5D4-F3D34648B927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C837D15-9083-4D31-BF1A-B781056D2ECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "D74C691D-F020-4950-ACF0-3E0743F5630A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28942C2-B11A-418E-93E1-592283DC21D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "0745F7A6-2EBE-4BC8-8B13-9C1EC0189D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "8845AC79-106D-4B74-89C3-64865A50E2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B7B814-D8D2-4B50-81C7-11B3A3210733",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "59FC6D4B-2EFA-4BB8-BCAF-B7CD803E87F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ECD3067-C747-4C2F-B16C-08578DABF5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B90660-C7E5-432E-9CEF-3DF4AAC52883",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "D871A6E4-77FD-4147-A753-E09553348D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB39A8F4-FAF2-40EB-A9AB-7261263688FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "72CA4165-A581-4D31-B880-1DB081629073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "756BB5DC-0F97-4BD1-A2F2-5487E0B1F437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "A581EA28-1325-4761-88FC-9E05B26AC2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E0F326-8C25-448E-B775-51A00E94B70C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E988B3D0-0E9F-46A3-942F-5B806C19125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "545F78EA-A4C8-4A02-9307-A7161341ABB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC17B5C-B516-4C51-9931-9C61DF551F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87F04C8D-46F8-4011-B8CB-7A2739D73826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F79729F-DC69-4C20-97FC-82CAD7731C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "524A1E8F-F1CB-4028-B664-1E97EA56FDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "278CAAEB-C8CE-4BE7-BA48-C353200CCC43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A41C450-BADF-41A8-97D2-16C0B41E3CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2CA121-6280-4E12-B16E-6731487BAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB655C8-862F-4F4A-95D0-3BE285492936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9FDD6C-B044-4411-8167-42B90122BDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "831B3C4D-0A3A-4F6F-BAF9-D132E4984C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "542F67D5-230B-425D-9F64-B272CA3F01E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the \"Who can read data submitted to this webform\" permission to delete arbitrary submissions via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "El submodulo mm_webform en el modulo Monster Menus v6.x-6.x anterior a v6.x-6.61 y v7.x-1.x anterior a v7.x-1.13 para Drupal no restringe adecuadamente el acceso a env\u00edos en formularios web, lo que permite a usuarios remotos autenticados con el permiso \"Who can read data submitted to this webform\" eliminar env\u00edos arbitrarios mediante vectores no especificados."
    }
  ],
  "id": "CVE-2013-4230",
  "lastModified": "2024-11-21T01:55:10.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-08-21T14:55:07.150",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54391"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/61711"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2059805"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2059807"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2059823"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/61711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2059805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2059807"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2059823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-11-09 16:59
Modified
2024-11-21 02:38
Severity ?
Summary
The recycle bin feature in the Monster Menus module 7.x-1.21 before 7.x-1.24 for Drupal does not properly remove nodes from view, which allows remote attackers to obtain sensitive information via an unspecified URL pattern.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E0F326-8C25-448E-B775-51A00E94B70C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E988B3D0-0E9F-46A3-942F-5B806C19125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "545F78EA-A4C8-4A02-9307-A7161341ABB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC17B5C-B516-4C51-9931-9C61DF551F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87F04C8D-46F8-4011-B8CB-7A2739D73826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F79729F-DC69-4C20-97FC-82CAD7731C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "524A1E8F-F1CB-4028-B664-1E97EA56FDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "278CAAEB-C8CE-4BE7-BA48-C353200CCC43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A41C450-BADF-41A8-97D2-16C0B41E3CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2CA121-6280-4E12-B16E-6731487BAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB655C8-862F-4F4A-95D0-3BE285492936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9FDD6C-B044-4411-8167-42B90122BDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "831B3C4D-0A3A-4F6F-BAF9-D132E4984C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866ED88-6BB7-45FA-B730-03A1AE8BABBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB5823E-CC26-4302-A201-BC1C711658B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EF947A-4B67-45E7-AA83-F92023B69578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BF0DAD-F3A5-497F-BF26-0FDE3FFC8BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8428F316-C7B6-4DEB-B882-324A4EE4CD7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDF8E00-8C4F-4B2F-A430-BF7A0BCE0047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "4568D59B-B63A-4F15-A56C-279EC8363FAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "72AAAE92-9C07-4354-A8ED-E90EEFD5116D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6EE90C9-CD90-40F1-B07A-C46EBBD487C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF52A08E-A1D6-45A8-92F2-91A26C679342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "74880040-BA9A-4E59-92F4-4B28D373C6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "542F67D5-230B-425D-9F64-B272CA3F01E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The recycle bin feature in the Monster Menus module 7.x-1.21 before 7.x-1.24 for Drupal does not properly remove nodes from view, which allows remote attackers to obtain sensitive information via an unspecified URL pattern."
    },
    {
      "lang": "es",
      "value": "La funcionalidad recycle bin en el m\u00f3dulo Monster Menus 7.x-1.21 en versiones anteriores a 7.x-1.24 para Drupal no elimina correctamente los nodos de la vista, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de un patr\u00f3n URL no especificado."
    }
  ],
  "id": "CVE-2015-8095",
  "lastModified": "2024-11-21T02:38:00.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-11-09T16:59:12.200",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/node/2608382"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2608414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.drupal.org/node/2608382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2608414"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-13 15:55
Modified
2024-11-21 01:55
Severity ?
Summary
The Monster Menus module 7.x-1.x before 7.x-1.15 allows remote attackers to read arbitrary node comments via a crafted URL.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E0F326-8C25-448E-B775-51A00E94B70C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E988B3D0-0E9F-46A3-942F-5B806C19125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "545F78EA-A4C8-4A02-9307-A7161341ABB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC17B5C-B516-4C51-9931-9C61DF551F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87F04C8D-46F8-4011-B8CB-7A2739D73826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F79729F-DC69-4C20-97FC-82CAD7731C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "524A1E8F-F1CB-4028-B664-1E97EA56FDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "278CAAEB-C8CE-4BE7-BA48-C353200CCC43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A41C450-BADF-41A8-97D2-16C0B41E3CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2CA121-6280-4E12-B16E-6731487BAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB655C8-862F-4F4A-95D0-3BE285492936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9FDD6C-B044-4411-8167-42B90122BDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "831B3C4D-0A3A-4F6F-BAF9-D132E4984C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866ED88-6BB7-45FA-B730-03A1AE8BABBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB5823E-CC26-4302-A201-BC1C711658B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "542F67D5-230B-425D-9F64-B272CA3F01E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Monster Menus module 7.x-1.x before 7.x-1.15 allows remote attackers to read arbitrary node comments via a crafted URL."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Monster Menus 7.x-1.x anterior a 7.x-1.15 permite a atacantes remotos leer comentarios de nodo arbitrarios a trav\u00e9s de una URL manipulada."
    }
  ],
  "id": "CVE-2013-4504",
  "lastModified": "2024-11-21T01:55:41.953",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-13T15:55:04.280",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2013/q4/210"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2123287"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2124289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q4/210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2123287"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2124289"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-08-21 14:55
Modified
2024-11-21 01:55
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Monster Menus module 7.x-1.x before 7.x-1.12 for Drupal allows remote authenticated users with permissions to add pages to inject arbitrary web script or HTML via a title in the page settings.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E0F326-8C25-448E-B775-51A00E94B70C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E988B3D0-0E9F-46A3-942F-5B806C19125E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "545F78EA-A4C8-4A02-9307-A7161341ABB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBC17B5C-B516-4C51-9931-9C61DF551F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "87F04C8D-46F8-4011-B8CB-7A2739D73826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F79729F-DC69-4C20-97FC-82CAD7731C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "524A1E8F-F1CB-4028-B664-1E97EA56FDD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "278CAAEB-C8CE-4BE7-BA48-C353200CCC43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A41C450-BADF-41A8-97D2-16C0B41E3CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A2CA121-6280-4E12-B16E-6731487BAA7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB655C8-862F-4F4A-95D0-3BE285492936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9FDD6C-B044-4411-8167-42B90122BDBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "542F67D5-230B-425D-9F64-B272CA3F01E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Monster Menus module 7.x-1.x before 7.x-1.12 for Drupal allows remote authenticated users with permissions to add pages to inject arbitrary web script or HTML via a title in the page settings."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad Cross-site scripting (XSS) en el modulo Monster Menus v7.x-1.x anterior a v7.x-1.12 para Drupal permite a los usuarios remotos autenticados con permisos para a\u00f1adir p\u00e1ginas, inyectar secuencias de comandos web o HTML a trav\u00e9s de un t\u00edtulo en la p\u00e1gina de configuraci\u00f3n."
    }
  ],
  "id": "CVE-2013-4229",
  "lastModified": "2024-11-21T01:55:10.407",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-08-21T14:55:07.117",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://drupalcode.org/project/monster_menus.git/blobdiff/4841dcb4e36bdc74efe4ae2459637029df929940..4adcb6b:/mm_static.inc"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54391"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/61710"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2059789"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2059823"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://drupalcode.org/project/monster_menus.git/blobdiff/4841dcb4e36bdc74efe4ae2459637029df929940..4adcb6b:/mm_static.inc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/61710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://drupal.org/node/2059789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2059823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86327"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}