All the vulnerabilites related to drupal - print
Vulnerability from fkie_nvd
Published
2009-03-23 20:00
Modified
2024-11-21 01:01
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://drupal.org/node/406516 | Patch, Vendor Advisory | |
cve@mitre.org | http://osvdb.org/52852 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://drupal.org/node/406516 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/52852 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
drupal | drupal | * | |
drupal | 5.x | ||
drupal | 5.x-1.0 | ||
drupal | 5.x-1.1 | ||
drupal | 5.x-1.2 | ||
drupal | 5.x-1.x-dev | ||
drupal | 5.x-2.1 | ||
drupal | 5.x-2.2 | ||
drupal | 5.x-2.x-dev | ||
drupal | 5.x-3.0 | ||
drupal | 5.x-3.1 | ||
drupal | 5.x-3.2 | ||
drupal | 5.x-3.3 | ||
drupal | 5.x-3.4 | ||
drupal | 5.x-3.5 | ||
drupal | 5.x-3.6 | ||
drupal | 5.x-3.7 | ||
drupal | 5.x-4.0 | ||
drupal | 5.x-4.1 | ||
drupal | 5.x-4.2 | ||
drupal | 5.x-4.3 | ||
drupal | 5.x-4.x | ||
drupal | 6.x-1.0 | ||
drupal | 6.x-1.0-rc3 | ||
drupal | 6.x-1.0-rc4 | ||
drupal | 6.x-1.0-rc5 | ||
drupal | 6.x-1.0-rc8 | ||
drupal | 6.x-1.0-rc9 | ||
drupal | 6.x-1.1 | ||
drupal | 6.x-1.2 | ||
drupal | 6.x-1.3 | ||
drupal | 6.x-1.4 | ||
drupal | 6.x-1.x-dev |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*", "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*", "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*", "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.x:dev:*:*:*:*:*:*", "matchCriteriaId": "A3FCB2CC-8184-406E-BE92-34DB6F1B27A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*", "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*", "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*", "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*", "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*", "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "AA70209E-98DA-4A0A-9272-2F4B04E62C8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en el m\u00f3dulo \"Enviar-por-email\" en el modulo de Drupal \"versiones de PDF, e-mail e impresora\" en las versiones 5.x antes de 5.x-4.4 y 6.x antes de 6.x-1.4, permite a atacantes remotos inyectar HTML o scripts web arbitrarios a trav\u00e9s de vectores relacionados con la salida de correo electr\u00f3nico en formato HTML." } ], "id": "CVE-2009-1047", "lastModified": "2024-11-21T01:01:32.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-03-23T20:00:00.407", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/406516" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/52852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/406516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/52852" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-20 18:30
Modified
2024-11-21 01:01
Severity ?
Summary
Unspecified vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
drupal | 5.x | ||
drupal | 5.x-1.0 | ||
drupal | 5.x-1.1 | ||
drupal | 5.x-1.2 | ||
drupal | 5.x-1.x-dev | ||
drupal | 5.x-2.1 | ||
drupal | 5.x-2.2 | ||
drupal | 5.x-2.x-dev | ||
drupal | 5.x-3.0 | ||
drupal | 5.x-3.1 | ||
drupal | 5.x-3.2 | ||
drupal | 5.x-3.3 | ||
drupal | 5.x-3.4 | ||
drupal | 5.x-3.5 | ||
drupal | 5.x-3.6 | ||
drupal | 5.x-3.7 | ||
drupal | 5.x-4.0 | ||
drupal | 5.x-4.1 | ||
drupal | 5.x-4.2 | ||
drupal | 5.x-4.3 | ||
drupal | 5.x-4.x | ||
drupal | 6.x-1.0 | ||
drupal | 6.x-1.0-rc3 | ||
drupal | 6.x-1.0-rc4 | ||
drupal | 6.x-1.0-rc5 | ||
drupal | 6.x-1.0-rc8 | ||
drupal | 6.x-1.0-rc9 | ||
drupal | 6.x-1.1 | ||
drupal | 6.x-1.2 | ||
drupal | 6.x-1.3 | ||
drupal | 6.x-1.x-dev | ||
drupal | drupal | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*", "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*", "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*", "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.x:dev:*:*:*:*:*:*", "matchCriteriaId": "A3FCB2CC-8184-406E-BE92-34DB6F1B27A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*", "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*", "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*", "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*", "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*", "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "AA70209E-98DA-4A0A-9272-2F4B04E62C8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el m\u00f3dulo Send by e-mail en los m\u00f3dulos \"Printer, e-mail y PDF versiones\" v5.x anterior a v5.x-4.4 y v6.x anterior a v6.x-1.4, un m\u00f3dulo para Drupal, permite a atacantes remotos enviar mensajes de correo m\u00e1sivo ilimitados a trav\u00e9s de vectores desconocidos relacionados con la API de control de inundaci\u00f3n." } ], "id": "CVE-2009-1037", "lastModified": "2024-11-21T01:01:30.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-20T18:30:00.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/406516" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/52785" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34374" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/406516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/52785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34173" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-20 14:30
Modified
2024-11-21 01:02
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
drupal | drupal | * | |
drupal | 5.x | ||
drupal | 5.x-1.0 | ||
drupal | 5.x-1.1 | ||
drupal | 5.x-1.2 | ||
drupal | 5.x-1.x-dev | ||
drupal | 5.x-2.1 | ||
drupal | 5.x-2.2 | ||
drupal | 5.x-2.x-dev | ||
drupal | 5.x-3.0 | ||
drupal | 5.x-3.1 | ||
drupal | 5.x-3.2 | ||
drupal | 5.x-3.3 | ||
drupal | 5.x-3.4 | ||
drupal | 5.x-3.5 | ||
drupal | 5.x-3.6 | ||
drupal | 5.x-3.7 | ||
drupal | 5.x-4.0 | ||
drupal | 5.x-4.1 | ||
drupal | 5.x-4.2 | ||
drupal | 5.x-4.3 | ||
drupal | 5.x-4.4 | ||
drupal | 5.x-4.x | ||
drupal | 6.x-1.0 | ||
drupal | 6.x-1.0-rc3 | ||
drupal | 6.x-1.0-rc4 | ||
drupal | 6.x-1.0-rc5 | ||
drupal | 6.x-1.0-rc8 | ||
drupal | 6.x-1.0-rc9 | ||
drupal | 6.x-1.1 | ||
drupal | 6.x-1.2 | ||
drupal | 6.x-1.3 | ||
drupal | 6.x-1.4 | ||
drupal | 6.x-1.x-dev |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*", "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*", "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*", "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2ECD6FD0-0A42-4445-9524-DE02E568FF98", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.x:dev:*:*:*:*:*:*", "matchCriteriaId": "A3FCB2CC-8184-406E-BE92-34DB6F1B27A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*", "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*", "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*", "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*", "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*", "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "AA70209E-98DA-4A0A-9272-2F4B04E62C8C", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el modulo m\u00f3dulo Print o Printer (en sus variantes e-mail y PDF) en sus versiones 5.x anteriores a 5.x-4.5 y 6.x anteriores a 6.x-1.5 del gestor de contenidos Drupal. Permite a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML a trav\u00e9s de los t\u00edtulos de contenido." } ], "id": "CVE-2009-1343", "lastModified": "2024-11-21T01:02:14.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-20T14:30:00.467", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://drupal.org/node/434748" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34738" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/53704" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/34545" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/434748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/53704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/34545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1060" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-05-29 16:30
Modified
2024-11-21 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
drupal | drupal | * | |
drupal | 5.x | ||
drupal | 5.x-1.0 | ||
drupal | 5.x-1.1 | ||
drupal | 5.x-1.2 | ||
drupal | 5.x-1.x-dev | ||
drupal | 5.x-2.1 | ||
drupal | 5.x-2.2 | ||
drupal | 5.x-2.x-dev | ||
drupal | 5.x-3.0 | ||
drupal | 5.x-3.1 | ||
drupal | 5.x-3.2 | ||
drupal | 5.x-3.3 | ||
drupal | 5.x-3.4 | ||
drupal | 5.x-3.5 | ||
drupal | 5.x-3.6 | ||
drupal | 5.x-3.7 | ||
drupal | 5.x-4.0 | ||
drupal | 5.x-4.1 | ||
drupal | 5.x-4.2 | ||
drupal | 5.x-4.3 | ||
drupal | 5.x-4.4 | ||
drupal | 5.x-4.5 | ||
drupal | 5.x-4.6 | ||
drupal | 6.x-1.0 | ||
drupal | 6.x-1.0-rc3 | ||
drupal | 6.x-1.0-rc4 | ||
drupal | 6.x-1.0-rc5 | ||
drupal | 6.x-1.0-rc8 | ||
drupal | 6.x-1.0-rc9 | ||
drupal | 6.x-1.1 | ||
drupal | 6.x-1.2 | ||
drupal | 6.x-1.3 | ||
drupal | 6.x-1.4 | ||
drupal | 6.x-1.5 | ||
drupal | 6.x-1.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*", "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*", "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*", "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*", "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*", "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2ECD6FD0-0A42-4445-9524-DE02E568FF98", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.5:*:*:*:*:*:*:*", "matchCriteriaId": "3DCB040D-45EC-4E44-8D66-4C796247EBB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:5.x-4.6:*:*:*:*:*:*:*", "matchCriteriaId": "ED8F5659-A54C-4956-A7F0-6DF982CC7CC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*", "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*", "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*", "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*", "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*", "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "0EFCA9EB-0A08-4FC2-BF40-DA3BD154DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F8244420-574B-48C0-A714-F122A0788170", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Print (tambi\u00e9n conocido como versiones Printer, e-mail y PDF) v5.x anteriores a v5.x-4.7 y v6.x anteriores a v6.x-1.7, un m\u00f3dulo para Drupal, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n modificando la cabecera de un documento, antes del elemento Content-Type META, contiene secuencias UTF-8 byte manipuladas que se tratan como UTF-7 en Internet Explorer 6 and 7, un caso relacionado con CVE-2009-1575." } ], "id": "CVE-2009-1823", "lastModified": "2024-11-21T01:03:27.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-05-29T16:30:00.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/461674" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/54427" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35040" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34954" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1320" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/461674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/54427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34954" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-10-09 14:55
Modified
2024-11-21 02:18
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
drupal | 6.x-1.1 | ||
drupal | 6.x-1.2 | ||
drupal | 6.x-1.3 | ||
drupal | 6.x-1.4 | ||
drupal | 6.x-1.5 | ||
drupal | 6.x-1.6 | ||
drupal | 6.x-1.7 | ||
drupal | 6.x-1.8 | ||
drupal | 6.x-1.9 | ||
drupal | 6.x-1.10 | ||
drupal | 6.x-1.11 | ||
drupal | 6.x-1.11 | ||
drupal | 6.x-1.12 | ||
drupal | 6.x-1.13 | ||
drupal | 6.x-1.14 | ||
drupal | 6.x-1.15 | ||
drupal | 6.x-1.16 | ||
drupal | 6.x-1.17 | ||
drupal | 6.x-1.18 | ||
drupal | 7.x-1.0 | ||
drupal | 7.x-1.0 | ||
drupal | 7.x-1.0 | ||
drupal | 7.x-1.0 | ||
drupal | 7.x-1.0 | ||
drupal | 7.x-1.1 | ||
drupal | 7.x-1.2 | ||
drupal | 7.x-1.x-dev | ||
drupal | 7.x-2.0 | ||
drupal | 7.x-2.0 | ||
drupal | 7.x-2.x-dev |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "0EFCA9EB-0A08-4FC2-BF40-DA3BD154DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F8244420-574B-48C0-A714-F122A0788170", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EDF8C976-F554-4F60-90D0-E5FF38CC0BCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "0C48EF4F-7ED8-4962-B0F6-16B14A707EDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "AC1A56B2-5238-428F-93DE-263335E6BE6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA275911-894A-4CFD-8ED4-40FC30F46408", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "4D246ABB-C6FD-4EA0-9977-D8B0F0D2564E", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.11:beta1:*:*:*:*:*:*", "matchCriteriaId": "3809C903-AA1F-4BC2-A1FF-65937F16153A", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F4379147-EE72-4676-BA72-57B82679DB06", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.13:*:*:*:*:*:*:*", "matchCriteriaId": "3DFCF73D-6AE2-47C3-B8CB-24C05F7FA2FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.14:*:*:*:*:*:*:*", "matchCriteriaId": "60344875-5677-4B32-A014-DE81D0B293BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.15:*:*:*:*:*:*:*", "matchCriteriaId": "597EF53A-CCC7-4514-84BF-88F37D469A50", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6BC4957-D19F-4835-8DC1-6F8979CFA736", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.17:*:*:*:*:*:*:*", "matchCriteriaId": "0A819B30-3322-4977-B5A2-944C1264D9D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.18:*:*:*:*:*:*:*", "matchCriteriaId": "E077002D-7B82-4D9F-B168-753B55C37B17", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB340CE8-813C-4C56-A6A9-C141C25A342F", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "A4A5A8C6-05B8-48BE-8D39-9FC020F25C76", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "2EF204D4-01D7-4BAD-9F9E-02B46EC83677", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F426F2DF-B3F3-46BD-BD8C-476C92E9FC55", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "831F6893-FB49-4D61-8991-C4BA43A851F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F3C9EB4-3BBE-48B4-BEC0-15FD8ADBBE2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A7DFC10-641B-4AC2-B07A-92D47BBF0D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "32D05D66-A4D1-417F-89CF-474B3251281A", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "1285F499-7C26-4BA4-9FD2-7F03B84D4A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "2ADF0914-D471-4335-9FC5-58B62FDA5AED", "vulnerable": true }, { "criteria": "cpe:2.3:a:drupal:print:7.x-2.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "98A5AA7F-AF17-438F-B280-F8C5CFCF5729", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes." }, { "lang": "es", "value": "Vulnerabilidad de XSS en el m\u00f3dulo Print (tambi\u00e9n conocido como las versiones Printer, e-mail y PDF) 6.x-1.x anterior a 6.x-1.19, 7.x-1.x anterior a 7.x-1.3, y 7.x-2.x anterior a 7.x-2.0 para Drupal permite a usuarios remotos autenticados con ciertos permisos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores relacionados con nodos." } ], "id": "CVE-2014-8078", "lastModified": "2024-11-21T02:18:30.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-10-09T14:55:06.297", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/57402" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://drupal.org/node/2231671" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.drupal.org/node/2231191" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.drupal.org/node/2231197" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://www.drupal.org/node/2231199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://drupal.org/node/2231671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.drupal.org/node/2231191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.drupal.org/node/2231197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.drupal.org/node/2231199" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2009-1343
Vulnerability from cvelistv5
Published
2009-04-20 14:06
Modified
2024-09-16 22:56
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles.
References
▼ | URL | Tags |
---|---|---|
http://drupal.org/node/434748 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/34545 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2009/1060 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/34738 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/53704 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:13:25.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/434748" }, { "name": "34545", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34545" }, { "name": "ADV-2009-1060", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1060" }, { "name": "34738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34738" }, { "name": "53704", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/53704" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-20T14:06:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/434748" }, { "name": "34545", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34545" }, { "name": "ADV-2009-1060", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1060" }, { "name": "34738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34738" }, { "name": "53704", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/53704" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1343", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://drupal.org/node/434748", "refsource": "CONFIRM", "url": "http://drupal.org/node/434748" }, { "name": "34545", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34545" }, { "name": "ADV-2009-1060", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1060" }, { "name": "34738", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34738" }, { "name": "53704", "refsource": "OSVDB", "url": "http://www.osvdb.org/53704" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1343", "datePublished": "2009-04-20T14:06:00Z", "dateReserved": "2009-04-20T00:00:00Z", "dateUpdated": "2024-09-16T22:56:09.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1047
Vulnerability from cvelistv5
Published
2009-03-23 19:26
Modified
2024-08-07 04:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/52852 | vdb-entry, x_refsource_OSVDB | |
http://drupal.org/node/406516 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:17.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "52852", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/52852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/406516" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-01T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "52852", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/52852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/406516" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "52852", "refsource": "OSVDB", "url": "http://osvdb.org/52852" }, { "name": "http://drupal.org/node/406516", "refsource": "CONFIRM", "url": "http://drupal.org/node/406516" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1047", "datePublished": "2009-03-23T19:26:00", "dateReserved": "2009-03-23T00:00:00", "dateUpdated": "2024-08-07T04:57:17.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1037
Vulnerability from cvelistv5
Published
2009-03-20 18:00
Modified
2024-08-07 04:57
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/34173 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/34374 | third-party-advisory, x_refsource_SECUNIA | |
http://drupal.org/node/406516 | x_refsource_CONFIRM | |
http://osvdb.org/52785 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:17.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34173", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34173" }, { "name": "34374", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34374" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/406516" }, { "name": "52785", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/52785" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-26T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34173", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34173" }, { "name": "34374", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34374" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/406516" }, { "name": "52785", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/52785" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34173", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34173" }, { "name": "34374", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34374" }, { "name": "http://drupal.org/node/406516", "refsource": "CONFIRM", "url": "http://drupal.org/node/406516" }, { "name": "52785", "refsource": "OSVDB", "url": "http://osvdb.org/52785" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1037", "datePublished": "2009-03-20T18:00:00", "dateReserved": "2009-03-20T00:00:00", "dateUpdated": "2024-08-07T04:57:17.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8078
Vulnerability from cvelistv5
Published
2014-10-09 14:00
Modified
2024-08-06 13:10
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes.
References
▼ | URL | Tags |
---|---|---|
https://www.drupal.org/node/2231191 | x_refsource_CONFIRM | |
http://secunia.com/advisories/57402 | third-party-advisory, x_refsource_SECUNIA | |
https://www.drupal.org/node/2231197 | x_refsource_CONFIRM | |
https://drupal.org/node/2231671 | x_refsource_MISC | |
https://www.drupal.org/node/2231199 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92349 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:50.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.drupal.org/node/2231191" }, { "name": "57402", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57402" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.drupal.org/node/2231197" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://drupal.org/node/2231671" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.drupal.org/node/2231199" }, { "name": "print-drupal-node-xss(92349)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.drupal.org/node/2231191" }, { "name": "57402", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57402" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.drupal.org/node/2231197" }, { "tags": [ "x_refsource_MISC" ], "url": "https://drupal.org/node/2231671" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.drupal.org/node/2231199" }, { "name": "print-drupal-node-xss(92349)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8078", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.drupal.org/node/2231191", "refsource": "CONFIRM", "url": "https://www.drupal.org/node/2231191" }, { "name": "57402", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57402" }, { "name": "https://www.drupal.org/node/2231197", "refsource": "CONFIRM", "url": "https://www.drupal.org/node/2231197" }, { "name": "https://drupal.org/node/2231671", "refsource": "MISC", "url": "https://drupal.org/node/2231671" }, { "name": "https://www.drupal.org/node/2231199", "refsource": "CONFIRM", "url": "https://www.drupal.org/node/2231199" }, { "name": "print-drupal-node-xss(92349)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8078", "datePublished": "2014-10-09T14:00:00", "dateReserved": "2014-10-09T00:00:00", "dateUpdated": "2024-08-06T13:10:50.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1823
Vulnerability from cvelistv5
Published
2009-05-29 16:24
Modified
2024-08-07 05:27
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/35040 | third-party-advisory, x_refsource_SECUNIA | |
http://drupal.org/node/461674 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50523 | vdb-entry, x_refsource_XF | |
http://osvdb.org/54427 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2009/1320 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/34954 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/461674" }, { "name": "printeremailpdf-utf7-xss(50523)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523" }, { "name": "54427", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/54427" }, { "name": "ADV-2009-1320", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1320" }, { "name": "34954", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34954" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/461674" }, { "name": "printeremailpdf-utf7-xss(50523)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523" }, { "name": "54427", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/54427" }, { "name": "ADV-2009-1320", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1320" }, { "name": "34954", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34954" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1823", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35040" }, { "name": "http://drupal.org/node/461674", "refsource": "CONFIRM", "url": "http://drupal.org/node/461674" }, { "name": "printeremailpdf-utf7-xss(50523)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523" }, { "name": "54427", "refsource": "OSVDB", "url": "http://osvdb.org/54427" }, { "name": "ADV-2009-1320", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1320" }, { "name": "34954", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34954" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1823", "datePublished": "2009-05-29T16:24:00", "dateReserved": "2009-05-29T00:00:00", "dateUpdated": "2024-08-07T05:27:54.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }