All the vulnerabilites related to daniel_honrade - om_maximenu
cve-2012-5553
Vulnerability from cvelistv5
Published
2012-12-03 21:00
Modified
2024-09-16 23:16
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the OM Maximenu module 6.x-1.x before 6.x-1.44 and 7.x-1.x before 7.x-1.44 for Drupal allow remote authenticated users with the "administer OM Maximenu" permission to inject arbitrary web script or HTML via the (1) Menu Title (2) Link Title, (3) Path Query, (4) Anchor, or (5) vocabulary names.
References
▼ | URL | Tags |
---|---|---|
http://drupal.org/node/1834048 | x_refsource_CONFIRM | |
http://drupal.org/node/1834866 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/11/20/4 | mailing-list, x_refsource_MLIST | |
http://www.madirish.net/551 | x_refsource_MISC | |
http://drupal.org/node/1834046 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:14:15.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1834048" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://drupal.org/node/1834866" }, { "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.madirish.net/551" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1834046" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the OM Maximenu module 6.x-1.x before 6.x-1.44 and 7.x-1.x before 7.x-1.44 for Drupal allow remote authenticated users with the \"administer OM Maximenu\" permission to inject arbitrary web script or HTML via the (1) Menu Title (2) Link Title, (3) Path Query, (4) Anchor, or (5) vocabulary names." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-12-03T21:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1834048" }, { "tags": [ "x_refsource_MISC" ], "url": "http://drupal.org/node/1834866" }, { "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.madirish.net/551" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1834046" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5553", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the OM Maximenu module 6.x-1.x before 6.x-1.44 and 7.x-1.x before 7.x-1.44 for Drupal allow remote authenticated users with the \"administer OM Maximenu\" permission to inject arbitrary web script or HTML via the (1) Menu Title (2) Link Title, (3) Path Query, (4) Anchor, or (5) vocabulary names." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://drupal.org/node/1834048", "refsource": "CONFIRM", "url": "http://drupal.org/node/1834048" }, { "name": "http://drupal.org/node/1834866", "refsource": "MISC", "url": "http://drupal.org/node/1834866" }, { "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" }, { "name": "http://www.madirish.net/551", "refsource": "MISC", "url": "http://www.madirish.net/551" }, { "name": "http://drupal.org/node/1834046", "refsource": "CONFIRM", "url": "http://drupal.org/node/1834046" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-5553", "datePublished": "2012-12-03T21:00:00Z", "dateReserved": "2012-10-24T00:00:00Z", "dateUpdated": "2024-09-16T23:16:50.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6065
Vulnerability from cvelistv5
Published
2012-12-03 21:00
Modified
2024-09-17 02:10
Severity ?
EPSS score ?
Summary
The OM Maximenu module 6.x-1.43 and earlier for Drupal, when the "Title has PHP" option is enabled, allows remote authenticated users with the "Administer OM Maximenu" permission to execute arbitrary PHP code via a "Link Title," a different vulnerability than CVE-2012-5553.
References
▼ | URL | Tags |
---|---|---|
http://drupal.org/node/1834048 | x_refsource_MISC | |
http://drupal.org/node/1834046 | x_refsource_MISC | |
http://www.madirish.net/551 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:21:28.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://drupal.org/node/1834048" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://drupal.org/node/1834046" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.madirish.net/551" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The OM Maximenu module 6.x-1.43 and earlier for Drupal, when the \"Title has PHP\" option is enabled, allows remote authenticated users with the \"Administer OM Maximenu\" permission to execute arbitrary PHP code via a \"Link Title,\" a different vulnerability than CVE-2012-5553." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-12-03T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://drupal.org/node/1834048" }, { "tags": [ "x_refsource_MISC" ], "url": "http://drupal.org/node/1834046" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.madirish.net/551" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6065", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OM Maximenu module 6.x-1.43 and earlier for Drupal, when the \"Title has PHP\" option is enabled, allows remote authenticated users with the \"Administer OM Maximenu\" permission to execute arbitrary PHP code via a \"Link Title,\" a different vulnerability than CVE-2012-5553." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://drupal.org/node/1834048", "refsource": "MISC", "url": "http://drupal.org/node/1834048" }, { "name": "http://drupal.org/node/1834046", "refsource": "MISC", "url": "http://drupal.org/node/1834046" }, { "name": "http://www.madirish.net/551", "refsource": "MISC", "url": "http://www.madirish.net/551" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6065", "datePublished": "2012-12-03T21:00:00Z", "dateReserved": "2012-12-03T00:00:00Z", "dateUpdated": "2024-09-17T02:10:41.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-12-03 21:55
Modified
2024-11-21 01:45
Severity ?
Summary
The OM Maximenu module 6.x-1.43 and earlier for Drupal, when the "Title has PHP" option is enabled, allows remote authenticated users with the "Administer OM Maximenu" permission to execute arbitrary PHP code via a "Link Title," a different vulnerability than CVE-2012-5553.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0DF7F4E-5410-45D1-B962-17FCA911C707", "versionEndIncluding": "6.x-1.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A16AA6FD-AF91-44A0-8503-185A8DF695F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E01B894F-C6A9-4A79-A9D5-C38B97F94413", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "43286B93-3C01-4529-A419-2C941D7E8162", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "DCC42B79-D8E6-439E-91AF-7E71A3FC92F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "9F073C65-AD6B-44D0-8FEA-EA321689EB2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "8195658B-A0E5-447F-A717-FA5ED38C1ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "6EF5C66C-0968-4CB6-82D1-7605A1A33BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "6A605B6D-0E21-4F83-AC59-3398EF565FA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "587DBFC2-DDCD-455C-BE85-6A6C850F38E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3D9B5AE-5029-4D9D-9776-ED2518D2E220", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0B574119-9104-405C-A9B7-9ED7532A1D0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0241E319-3ADC-49B7-9ED2-CC836D8B212B", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C0C18F14-AE24-4A13-84CF-D3BB11A4E2B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F8ADAB31-7F10-47BC-B2B9-410CB5EBF8E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5B9EF8A6-682D-4035-9C3F-B6876064114C", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "A7040695-CBF4-4594-A2D5-C54291E5F96A", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "27CE946C-89AA-4FEB-BA37-26BDAF8C606A", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "92EDDA98-3586-4FB6-A983-A2E1D06C6468", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "20378BB1-A766-4CF6-AA9B-7C3ABDFFD15A", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "15D0359B-FEF7-4A23-8E1B-B18D734F020E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.13:*:*:*:*:*:*:*", "matchCriteriaId": "74E6E178-03E6-459C-9108-47C011D33655", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.14:*:*:*:*:*:*:*", "matchCriteriaId": "211EB026-3604-4A7B-9048-AC3FD8BF4D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.15:*:*:*:*:*:*:*", "matchCriteriaId": "2887F3EA-BFD4-4048-B08D-A6A800EF88CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.16:*:*:*:*:*:*:*", "matchCriteriaId": "F69CD8B9-453D-4E86-A146-8E4FD1FBE7A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.17:*:*:*:*:*:*:*", "matchCriteriaId": "2A690D5E-66B7-47A9-A080-8586D3A932EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.18:*:*:*:*:*:*:*", "matchCriteriaId": "06B10D3E-F207-4E76-8157-378EB5251B7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.19:*:*:*:*:*:*:*", "matchCriteriaId": "6027F058-D451-4012-A15B-F96A9F7958EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.20:*:*:*:*:*:*:*", "matchCriteriaId": "060F7E19-191A-4A25-AD6A-4A5FA6DC6C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7A4B6BC7-16FB-44D1-8EE7-21BE4DDC0390", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.22:*:*:*:*:*:*:*", "matchCriteriaId": "E4C3B5E1-BF1D-4A48-BF37-CF1815486E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.23:*:*:*:*:*:*:*", "matchCriteriaId": "0933B778-8110-4F60-B5EA-7515132BCB15", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.24:*:*:*:*:*:*:*", "matchCriteriaId": "767A4DC0-49F9-4802-AD0F-87F1E5583F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.25:*:*:*:*:*:*:*", "matchCriteriaId": "A4AC82BA-0904-4293-BE12-9FF8EBF56ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.26:*:*:*:*:*:*:*", "matchCriteriaId": "F4C4B405-3A27-4C7F-9727-41B61B2941A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.27:*:*:*:*:*:*:*", "matchCriteriaId": "54D08779-17F7-492E-A7A4-6C969624E893", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.28:*:*:*:*:*:*:*", "matchCriteriaId": "E23E08C3-1665-4E3C-BC1B-3AF177501268", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.29:*:*:*:*:*:*:*", "matchCriteriaId": "29234EA7-64E2-4C1B-94A9-EB4D5F53F6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.30:*:*:*:*:*:*:*", "matchCriteriaId": "0EFE7A82-8BE5-4ABA-B895-0340C4E0B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.31:*:*:*:*:*:*:*", "matchCriteriaId": "FAB761CE-7B10-45FC-87CF-DF071CE297FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.32:*:*:*:*:*:*:*", "matchCriteriaId": "2BE7C70A-BDD1-4845-97C4-CA5036BA09B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.33:*:*:*:*:*:*:*", "matchCriteriaId": "1700A4CC-6221-403B-85F7-D16D4C42F5C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.34:*:*:*:*:*:*:*", "matchCriteriaId": "4FCC8180-5D0A-40EB-BF2B-6AEC187CB10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.35:*:*:*:*:*:*:*", "matchCriteriaId": "13A92F8B-0B99-4A0A-AB6A-F0C506D16988", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.36:*:*:*:*:*:*:*", "matchCriteriaId": "9114461D-9651-4E6A-A163-A19DD9CF8712", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.37:*:*:*:*:*:*:*", "matchCriteriaId": "063A7D54-C441-4439-973A-8A76B8CDC8C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.38:*:*:*:*:*:*:*", "matchCriteriaId": "D91AA171-27FF-4DAF-9DA4-FF6BA357BC9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.39:*:*:*:*:*:*:*", "matchCriteriaId": "1482A594-304F-4593-ADF7-4A9745DA469E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.40:*:*:*:*:*:*:*", "matchCriteriaId": "C36F5737-E4A9-432A-A80D-0ADD7249FD3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.41:*:*:*:*:*:*:*", "matchCriteriaId": "996431CB-4F17-435B-8E03-E4D8CAD3F61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.42:*:*:*:*:*:*:*", "matchCriteriaId": "8186E63C-E3A3-4C93-B009-A6B2180FABD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "9F81DDA3-D2A5-4185-B089-D2206CAF86D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OM Maximenu module 6.x-1.43 and earlier for Drupal, when the \"Title has PHP\" option is enabled, allows remote authenticated users with the \"Administer OM Maximenu\" permission to execute arbitrary PHP code via a \"Link Title,\" a different vulnerability than CVE-2012-5553." }, { "lang": "es", "value": "El m\u00f3dulo OM Maximenu v6.x-1.43 y anteriores para Drupal, cuando la opci\u00f3n \"Title has PHP\" est\u00e1 activada, permite a usuarios autenticados remotamente con permisos \"Administer OM Maximenu\" ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de \"Link Title\", una vulnerabilidad diferente de CVE-2012-5553." } ], "id": "CVE-2012-6065", "lastModified": "2024-11-21T01:45:44.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-12-03T21:55:03.067", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834046" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834048" }, { "source": "cve@mitre.org", "url": "http://www.madirish.net/551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.madirish.net/551" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-12-03 21:55
Modified
2024-11-21 01:44
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the OM Maximenu module 6.x-1.x before 6.x-1.44 and 7.x-1.x before 7.x-1.44 for Drupal allow remote authenticated users with the "administer OM Maximenu" permission to inject arbitrary web script or HTML via the (1) Menu Title (2) Link Title, (3) Path Query, (4) Anchor, or (5) vocabulary names.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A16AA6FD-AF91-44A0-8503-185A8DF695F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "E01B894F-C6A9-4A79-A9D5-C38B97F94413", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "43286B93-3C01-4529-A419-2C941D7E8162", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "DCC42B79-D8E6-439E-91AF-7E71A3FC92F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "9F073C65-AD6B-44D0-8FEA-EA321689EB2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "8195658B-A0E5-447F-A717-FA5ED38C1ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "6EF5C66C-0968-4CB6-82D1-7605A1A33BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "6A605B6D-0E21-4F83-AC59-3398EF565FA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "587DBFC2-DDCD-455C-BE85-6A6C850F38E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3D9B5AE-5029-4D9D-9776-ED2518D2E220", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0B574119-9104-405C-A9B7-9ED7532A1D0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0241E319-3ADC-49B7-9ED2-CC836D8B212B", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C0C18F14-AE24-4A13-84CF-D3BB11A4E2B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F8ADAB31-7F10-47BC-B2B9-410CB5EBF8E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "5B9EF8A6-682D-4035-9C3F-B6876064114C", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "A7040695-CBF4-4594-A2D5-C54291E5F96A", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "27CE946C-89AA-4FEB-BA37-26BDAF8C606A", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "92EDDA98-3586-4FB6-A983-A2E1D06C6468", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "20378BB1-A766-4CF6-AA9B-7C3ABDFFD15A", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "15D0359B-FEF7-4A23-8E1B-B18D734F020E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.13:*:*:*:*:*:*:*", "matchCriteriaId": "74E6E178-03E6-459C-9108-47C011D33655", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.14:*:*:*:*:*:*:*", "matchCriteriaId": "211EB026-3604-4A7B-9048-AC3FD8BF4D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.15:*:*:*:*:*:*:*", "matchCriteriaId": "2887F3EA-BFD4-4048-B08D-A6A800EF88CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.16:*:*:*:*:*:*:*", "matchCriteriaId": "F69CD8B9-453D-4E86-A146-8E4FD1FBE7A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.17:*:*:*:*:*:*:*", "matchCriteriaId": "2A690D5E-66B7-47A9-A080-8586D3A932EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.18:*:*:*:*:*:*:*", "matchCriteriaId": "06B10D3E-F207-4E76-8157-378EB5251B7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.19:*:*:*:*:*:*:*", "matchCriteriaId": "6027F058-D451-4012-A15B-F96A9F7958EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.20:*:*:*:*:*:*:*", "matchCriteriaId": "060F7E19-191A-4A25-AD6A-4A5FA6DC6C93", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7A4B6BC7-16FB-44D1-8EE7-21BE4DDC0390", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.22:*:*:*:*:*:*:*", "matchCriteriaId": "E4C3B5E1-BF1D-4A48-BF37-CF1815486E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.23:*:*:*:*:*:*:*", "matchCriteriaId": "0933B778-8110-4F60-B5EA-7515132BCB15", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.24:*:*:*:*:*:*:*", "matchCriteriaId": "767A4DC0-49F9-4802-AD0F-87F1E5583F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.25:*:*:*:*:*:*:*", "matchCriteriaId": "A4AC82BA-0904-4293-BE12-9FF8EBF56ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.26:*:*:*:*:*:*:*", "matchCriteriaId": "F4C4B405-3A27-4C7F-9727-41B61B2941A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.27:*:*:*:*:*:*:*", "matchCriteriaId": "54D08779-17F7-492E-A7A4-6C969624E893", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.28:*:*:*:*:*:*:*", "matchCriteriaId": "E23E08C3-1665-4E3C-BC1B-3AF177501268", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.29:*:*:*:*:*:*:*", "matchCriteriaId": "29234EA7-64E2-4C1B-94A9-EB4D5F53F6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.30:*:*:*:*:*:*:*", "matchCriteriaId": "0EFE7A82-8BE5-4ABA-B895-0340C4E0B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.31:*:*:*:*:*:*:*", "matchCriteriaId": "FAB761CE-7B10-45FC-87CF-DF071CE297FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.32:*:*:*:*:*:*:*", "matchCriteriaId": "2BE7C70A-BDD1-4845-97C4-CA5036BA09B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.33:*:*:*:*:*:*:*", "matchCriteriaId": "1700A4CC-6221-403B-85F7-D16D4C42F5C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.34:*:*:*:*:*:*:*", "matchCriteriaId": "4FCC8180-5D0A-40EB-BF2B-6AEC187CB10B", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.35:*:*:*:*:*:*:*", "matchCriteriaId": "13A92F8B-0B99-4A0A-AB6A-F0C506D16988", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.36:*:*:*:*:*:*:*", "matchCriteriaId": "9114461D-9651-4E6A-A163-A19DD9CF8712", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.37:*:*:*:*:*:*:*", "matchCriteriaId": "063A7D54-C441-4439-973A-8A76B8CDC8C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.38:*:*:*:*:*:*:*", "matchCriteriaId": "D91AA171-27FF-4DAF-9DA4-FF6BA357BC9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.39:*:*:*:*:*:*:*", "matchCriteriaId": "1482A594-304F-4593-ADF7-4A9745DA469E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.40:*:*:*:*:*:*:*", "matchCriteriaId": "C36F5737-E4A9-432A-A80D-0ADD7249FD3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.41:*:*:*:*:*:*:*", "matchCriteriaId": "996431CB-4F17-435B-8E03-E4D8CAD3F61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.42:*:*:*:*:*:*:*", "matchCriteriaId": "8186E63C-E3A3-4C93-B009-A6B2180FABD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.43:*:*:*:*:*:*:*", "matchCriteriaId": "7157E224-82A5-4289-A132-277D083F7BF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:6.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "9F81DDA3-D2A5-4185-B089-D2206CAF86D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "38C2E361-9C2B-4AFC-AD19-DBC2BF2E2FAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED01614A-4DD0-4795-A6CF-213BE61D7189", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6109CAAC-7F93-4B57-A427-D5FAA37C0F83", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "6D830879-ED53-415A-938B-631C156E8AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA932CCE-3448-4411-AD9D-232E98780623", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AC102056-F55A-45D1-866A-683D9E8BF40D", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "69F9EFEB-10AE-4715-A9DF-8F959D021447", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "A8D43188-B3A2-4C5D-BFE1-115EFBC7B344", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "9A8C56E3-1C64-493C-9033-C35179937383", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "306D84A1-E1AD-4A80-967A-825026F8986E", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "5820AB3B-5102-43A6-A6A0-87AC86B495B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "98E880ED-B638-450E-93D5-6C1B6803F299", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "E10762BD-2158-49A7-AB7A-0519843D85C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.13:*:*:*:*:*:*:*", "matchCriteriaId": "9FA05A48-E31B-4C38-ABC2-9B99930BC445", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.14:*:*:*:*:*:*:*", "matchCriteriaId": "40419BF1-02DF-49A3-A082-537B9F94906F", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.15:*:*:*:*:*:*:*", "matchCriteriaId": "65AAD1F4-048C-4486-B11D-E75FD1795393", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.16:*:*:*:*:*:*:*", "matchCriteriaId": "14714749-7675-4CEB-AEC7-B35C2B28EAA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.17:*:*:*:*:*:*:*", "matchCriteriaId": "6CE52C54-FB5B-4237-BA8B-8BF66F0569BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.18:*:*:*:*:*:*:*", "matchCriteriaId": "29BC5082-950A-4FE7-A197-87B6F4D0D392", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.19:*:*:*:*:*:*:*", "matchCriteriaId": "9F0ABBDA-6DB9-4F5B-9428-63E89D2FF7CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.20:*:*:*:*:*:*:*", "matchCriteriaId": "8FE62668-C59B-4848-8D64-031485B45365", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.21:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D9E3E-31C5-4F7B-8A7C-FC42D9958AEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.22:*:*:*:*:*:*:*", "matchCriteriaId": "10A17779-D483-4B66-8B9B-F02513C51593", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.23:*:*:*:*:*:*:*", "matchCriteriaId": "1F8A7C33-DBBD-424F-80BF-61B1E558051B", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.24:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE0F0B-6C76-407E-86ED-CAAE3C6E4B47", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.25:*:*:*:*:*:*:*", "matchCriteriaId": "F16EE3F8-19BB-4C06-947F-CC6888F519B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.26:*:*:*:*:*:*:*", "matchCriteriaId": "E3600E4C-4BB4-414F-BBF9-0056AAEE856C", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.27:*:*:*:*:*:*:*", "matchCriteriaId": "7E7DD1F2-C92B-4D0B-A909-0B3C71838EB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.28:*:*:*:*:*:*:*", "matchCriteriaId": "085A7C0A-38FF-4381-A487-0B3534419C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.29:*:*:*:*:*:*:*", "matchCriteriaId": "618487D9-E0C4-4108-ADC2-0228985E8C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.30:*:*:*:*:*:*:*", "matchCriteriaId": "76E12DB1-FC77-42DC-ACB9-02B3A4AC47C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.31:*:*:*:*:*:*:*", "matchCriteriaId": "63470767-4DD9-4A45-B748-5309577BE3F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.32:*:*:*:*:*:*:*", "matchCriteriaId": "AC48E619-454B-4BCC-A2A4-20656DB04456", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.33:*:*:*:*:*:*:*", "matchCriteriaId": "AD389F73-0715-4A5D-88C5-E2589918D2A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.34:*:*:*:*:*:*:*", "matchCriteriaId": "3F8813AE-EA69-4968-BE1B-F9DA853F55DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.35:*:*:*:*:*:*:*", "matchCriteriaId": "745173D7-EB3A-4C3F-8BCD-C6B3AFB55BDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.36:*:*:*:*:*:*:*", "matchCriteriaId": "467CF10A-3709-464F-9DEE-947700801C70", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.37:*:*:*:*:*:*:*", "matchCriteriaId": "55DBB7C8-9163-4AB3-AB59-4F7E562229AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.38:*:*:*:*:*:*:*", "matchCriteriaId": "C8CF71CA-B3A8-43DA-9B8C-7063733FD35D", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.39:*:*:*:*:*:*:*", "matchCriteriaId": "5475E2A0-30F3-4ADE-8B1A-6574EB8E3FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.40:*:*:*:*:*:*:*", "matchCriteriaId": "E79EA34A-9A71-4B78-AB9B-F361B6416AC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.41:*:*:*:*:*:*:*", "matchCriteriaId": "100AB803-7B11-4B4C-A6FD-6D365A3E9AF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.42:*:*:*:*:*:*:*", "matchCriteriaId": "A433C6F4-2961-4259-A5C2-17CF15814514", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.43:*:*:*:*:*:*:*", "matchCriteriaId": "6C54F915-403F-4ED7-967C-F7490C067C35", "vulnerable": true }, { "criteria": "cpe:2.3:a:daniel_honrade:om_maximenu:7.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "0C5FAE87-57E9-478B-AC5F-70E88324273E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the OM Maximenu module 6.x-1.x before 6.x-1.44 and 7.x-1.x before 7.x-1.44 for Drupal allow remote authenticated users with the \"administer OM Maximenu\" permission to inject arbitrary web script or HTML via the (1) Menu Title (2) Link Title, (3) Path Query, (4) Anchor, or (5) vocabulary names." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo OM Maximanu v6.x-1.x antes de v6.x-1.44 y v7.x-1.x antes de v7.x-1.44 para Drupal permite a usuarios autenticados remotamente con permisos \"administer OM Maximenu\" inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) Menu Title (2) Link Title, (3) Path Query, (4) Anchor, o (5) nombres de vocabulario." } ], "id": "CVE-2012-5553", "lastModified": "2024-11-21T01:44:52.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-12-03T21:55:02.643", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834046" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834048" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1834866" }, { "source": "secalert@redhat.com", "url": "http://www.madirish.net/551" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1834048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1834866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.madirish.net/551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }