All the vulnerabilites related to drupal - print
Vulnerability from fkie_nvd
Published
2009-03-23 20:00
Modified
2024-11-21 01:01
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail.
Impacted products
Vendor Product Version
drupal drupal *
drupal print 5.x
drupal print 5.x-1.0
drupal print 5.x-1.1
drupal print 5.x-1.2
drupal print 5.x-1.x-dev
drupal print 5.x-2.1
drupal print 5.x-2.2
drupal print 5.x-2.x-dev
drupal print 5.x-3.0
drupal print 5.x-3.1
drupal print 5.x-3.2
drupal print 5.x-3.3
drupal print 5.x-3.4
drupal print 5.x-3.5
drupal print 5.x-3.6
drupal print 5.x-3.7
drupal print 5.x-4.0
drupal print 5.x-4.1
drupal print 5.x-4.2
drupal print 5.x-4.3
drupal print 5.x-4.x
drupal print 6.x-1.0
drupal print 6.x-1.0-rc3
drupal print 6.x-1.0-rc4
drupal print 6.x-1.0-rc5
drupal print 6.x-1.0-rc8
drupal print 6.x-1.0-rc9
drupal print 6.x-1.1
drupal print 6.x-1.2
drupal print 6.x-1.3
drupal print 6.x-1.4
drupal print 6.x-1.x-dev



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*",
              "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "A3FCB2CC-8184-406E-BE92-34DB6F1B27A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA70209E-98DA-4A0A-9272-2F4B04E62C8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en el m\u00f3dulo \"Enviar-por-email\" en el modulo de Drupal \"versiones de PDF, e-mail e impresora\" en las versiones 5.x antes de 5.x-4.4 y 6.x antes de 6.x-1.4, permite a atacantes remotos inyectar HTML o scripts web arbitrarios a trav\u00e9s de vectores relacionados con la salida de correo electr\u00f3nico en formato HTML."
    }
  ],
  "id": "CVE-2009-1047",
  "lastModified": "2024-11-21T01:01:32.227",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-03-23T20:00:00.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/406516"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/52852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/406516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/52852"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-03-20 18:30
Modified
2024-11-21 01:01
Severity ?
Summary
Unspecified vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API.
Impacted products
Vendor Product Version
drupal print 5.x
drupal print 5.x-1.0
drupal print 5.x-1.1
drupal print 5.x-1.2
drupal print 5.x-1.x-dev
drupal print 5.x-2.1
drupal print 5.x-2.2
drupal print 5.x-2.x-dev
drupal print 5.x-3.0
drupal print 5.x-3.1
drupal print 5.x-3.2
drupal print 5.x-3.3
drupal print 5.x-3.4
drupal print 5.x-3.5
drupal print 5.x-3.6
drupal print 5.x-3.7
drupal print 5.x-4.0
drupal print 5.x-4.1
drupal print 5.x-4.2
drupal print 5.x-4.3
drupal print 5.x-4.x
drupal print 6.x-1.0
drupal print 6.x-1.0-rc3
drupal print 6.x-1.0-rc4
drupal print 6.x-1.0-rc5
drupal print 6.x-1.0-rc8
drupal print 6.x-1.0-rc9
drupal print 6.x-1.1
drupal print 6.x-1.2
drupal print 6.x-1.3
drupal print 6.x-1.x-dev
drupal drupal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*",
              "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "A3FCB2CC-8184-406E-BE92-34DB6F1B27A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA70209E-98DA-4A0A-9272-2F4B04E62C8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en el m\u00f3dulo Send by e-mail en los m\u00f3dulos \"Printer, e-mail y PDF versiones\" v5.x anterior a v5.x-4.4 y v6.x anterior a v6.x-1.4, un m\u00f3dulo para Drupal, permite a atacantes remotos enviar mensajes de correo m\u00e1sivo ilimitados a trav\u00e9s de vectores desconocidos relacionados con la API de control de inundaci\u00f3n."
    }
  ],
  "id": "CVE-2009-1037",
  "lastModified": "2024-11-21T01:01:30.690",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-20T18:30:00.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/406516"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/52785"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34374"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/406516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/52785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34173"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-04-20 14:30
Modified
2024-11-21 01:02
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles.
Impacted products
Vendor Product Version
drupal drupal *
drupal print 5.x
drupal print 5.x-1.0
drupal print 5.x-1.1
drupal print 5.x-1.2
drupal print 5.x-1.x-dev
drupal print 5.x-2.1
drupal print 5.x-2.2
drupal print 5.x-2.x-dev
drupal print 5.x-3.0
drupal print 5.x-3.1
drupal print 5.x-3.2
drupal print 5.x-3.3
drupal print 5.x-3.4
drupal print 5.x-3.5
drupal print 5.x-3.6
drupal print 5.x-3.7
drupal print 5.x-4.0
drupal print 5.x-4.1
drupal print 5.x-4.2
drupal print 5.x-4.3
drupal print 5.x-4.4
drupal print 5.x-4.x
drupal print 6.x-1.0
drupal print 6.x-1.0-rc3
drupal print 6.x-1.0-rc4
drupal print 6.x-1.0-rc5
drupal print 6.x-1.0-rc8
drupal print 6.x-1.0-rc9
drupal print 6.x-1.1
drupal print 6.x-1.2
drupal print 6.x-1.3
drupal print 6.x-1.4
drupal print 6.x-1.x-dev



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*",
              "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECD6FD0-0A42-4445-9524-DE02E568FF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "A3FCB2CC-8184-406E-BE92-34DB6F1B27A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA70209E-98DA-4A0A-9272-2F4B04E62C8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el modulo m\u00f3dulo Print o Printer (en sus variantes e-mail y PDF) en sus versiones 5.x anteriores a 5.x-4.5 y 6.x anteriores a 6.x-1.5 del gestor de contenidos Drupal. Permite a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML a trav\u00e9s de los t\u00edtulos de contenido."
    }
  ],
  "id": "CVE-2009-1343",
  "lastModified": "2024-11-21T01:02:14.500",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-04-20T14:30:00.467",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://drupal.org/node/434748"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34738"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/53704"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34545"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://drupal.org/node/434748"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/53704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1060"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-05-29 16:30
Modified
2024-11-21 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575.
Impacted products
Vendor Product Version
drupal drupal *
drupal print 5.x
drupal print 5.x-1.0
drupal print 5.x-1.1
drupal print 5.x-1.2
drupal print 5.x-1.x-dev
drupal print 5.x-2.1
drupal print 5.x-2.2
drupal print 5.x-2.x-dev
drupal print 5.x-3.0
drupal print 5.x-3.1
drupal print 5.x-3.2
drupal print 5.x-3.3
drupal print 5.x-3.4
drupal print 5.x-3.5
drupal print 5.x-3.6
drupal print 5.x-3.7
drupal print 5.x-4.0
drupal print 5.x-4.1
drupal print 5.x-4.2
drupal print 5.x-4.3
drupal print 5.x-4.4
drupal print 5.x-4.5
drupal print 5.x-4.6
drupal print 6.x-1.0
drupal print 6.x-1.0-rc3
drupal print 6.x-1.0-rc4
drupal print 6.x-1.0-rc5
drupal print 6.x-1.0-rc8
drupal print 6.x-1.0-rc9
drupal print 6.x-1.1
drupal print 6.x-1.2
drupal print 6.x-1.3
drupal print 6.x-1.4
drupal print 6.x-1.5
drupal print 6.x-1.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x:*:*:*:*:*:*:*",
              "matchCriteriaId": "13532942-BC0A-4B25-9FE3-679E5A698F2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1DFE95-5788-4C00-8D24-FD2068352293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35122AE-7CAB-4AB1-88E7-EAF882618E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD3428DA-1459-4B1F-A19B-C66F8FB75BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFF4E5-8F49-4AC4-8CEB-F502E6882087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7EF9D6-39D2-4922-B516-44B31E38DB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "030BC1EE-8ED5-4955-AD4B-1745690ABB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-2.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "989C2B4B-2CAA-4F85-899B-2E85C7C1AD39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18D750A-6F98-4A72-B040-9A448EC007BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5029B78B-0160-4547-9934-19A891AB2652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE82C4B9-F7F2-424F-9AF9-9D945FD563EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0F5EE5-217D-40BF-BEF8-224FBDFB8E39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C88506DA-94A1-4559-BCD8-D6DA9D438AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0A448C-470C-4AA9-BAB5-8EAC14A6141E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D315DA5E-3012-4F25-8C7D-21C2BA172A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "961AEFF7-499F-4709-BB2F-BB623A4CE19F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7267D96A-43CC-418B-B115-DE77154BCDAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9302C93E-C85F-4EA3-8BE2-3575592B50B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03EC0689-1246-4E34-948B-6380BB2BAC90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "746A3749-36A4-49EA-B705-922B9D260CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ECD6FD0-0A42-4445-9524-DE02E568FF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DCB040D-45EC-4E44-8D66-4C796247EBB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:5.x-4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8F5659-A54C-4956-A7F0-6DF982CC7CC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41A6973-2C38-418D-A16F-93F77F902206",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6DF7D4-0992-4677-BA0A-860F329E6D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E8A1B8F-021C-4558-880F-9E7FCFE2D323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF939A54-5458-4FD5-916D-301CD3B57F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF7248F-2CD2-4551-AD81-3207FE1D45A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.0-rc9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD956162-E836-4777-8346-DF6DAA100A81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EFCA9EB-0A08-4FC2-BF40-DA3BD154DEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8244420-574B-48C0-A714-F122A0788170",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Print (tambi\u00e9n conocido como versiones Printer, e-mail y PDF) v5.x anteriores a v5.x-4.7 y v6.x anteriores a v6.x-1.7, un m\u00f3dulo para Drupal, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n modificando la cabecera de un documento, antes del elemento Content-Type META, contiene secuencias UTF-8 byte manipuladas que se tratan como UTF-7 en Internet Explorer 6 and 7, un caso relacionado con CVE-2009-1575."
    }
  ],
  "id": "CVE-2009-1823",
  "lastModified": "2024-11-21T01:03:27.717",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-05-29T16:30:00.517",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/461674"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/54427"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35040"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34954"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1320"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/461674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34954"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-10-09 14:55
Modified
2024-11-21 02:18
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes.
Impacted products
Vendor Product Version
drupal print 6.x-1.1
drupal print 6.x-1.2
drupal print 6.x-1.3
drupal print 6.x-1.4
drupal print 6.x-1.5
drupal print 6.x-1.6
drupal print 6.x-1.7
drupal print 6.x-1.8
drupal print 6.x-1.9
drupal print 6.x-1.10
drupal print 6.x-1.11
drupal print 6.x-1.11
drupal print 6.x-1.12
drupal print 6.x-1.13
drupal print 6.x-1.14
drupal print 6.x-1.15
drupal print 6.x-1.16
drupal print 6.x-1.17
drupal print 6.x-1.18
drupal print 7.x-1.0
drupal print 7.x-1.0
drupal print 7.x-1.0
drupal print 7.x-1.0
drupal print 7.x-1.0
drupal print 7.x-1.1
drupal print 7.x-1.2
drupal print 7.x-1.x-dev
drupal print 7.x-2.0
drupal print 7.x-2.0
drupal print 7.x-2.x-dev



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EFCA9EB-0A08-4FC2-BF40-DA3BD154DEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8244420-574B-48C0-A714-F122A0788170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF8C976-F554-4F60-90D0-E5FF38CC0BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C48EF4F-7ED8-4962-B0F6-16B14A707EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1A56B2-5238-428F-93DE-263335E6BE6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA275911-894A-4CFD-8ED4-40FC30F46408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D246ABB-C6FD-4EA0-9977-D8B0F0D2564E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.11:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "3809C903-AA1F-4BC2-A1FF-65937F16153A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4379147-EE72-4676-BA72-57B82679DB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DFCF73D-6AE2-47C3-B8CB-24C05F7FA2FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "60344875-5677-4B32-A014-DE81D0B293BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "597EF53A-CCC7-4514-84BF-88F37D469A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6BC4957-D19F-4835-8DC1-6F8979CFA736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A819B30-3322-4977-B5A2-944C1264D9D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:6.x-1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E077002D-7B82-4D9F-B168-753B55C37B17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB340CE8-813C-4C56-A6A9-C141C25A342F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "A4A5A8C6-05B8-48BE-8D39-9FC020F25C76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "2EF204D4-01D7-4BAD-9F9E-02B46EC83677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F426F2DF-B3F3-46BD-BD8C-476C92E9FC55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "831F6893-FB49-4D61-8991-C4BA43A851F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F3C9EB4-3BBE-48B4-BEC0-15FD8ADBBE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7DFC10-641B-4AC2-B07A-92D47BBF0D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-1.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "32D05D66-A4D1-417F-89CF-474B3251281A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "1285F499-7C26-4BA4-9FD2-7F03B84D4A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "2ADF0914-D471-4335-9FC5-58B62FDA5AED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drupal:print:7.x-2.x-dev:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A5AA7F-AF17-438F-B280-F8C5CFCF5729",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en el m\u00f3dulo Print (tambi\u00e9n conocido como las versiones Printer, e-mail y PDF) 6.x-1.x anterior a 6.x-1.19, 7.x-1.x anterior a 7.x-1.3, y 7.x-2.x anterior a 7.x-2.0 para Drupal permite a usuarios remotos autenticados con ciertos permisos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores relacionados con nodos."
    }
  ],
  "id": "CVE-2014-8078",
  "lastModified": "2024-11-21T02:18:30.110",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-10-09T14:55:06.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/57402"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2231671"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2231191"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2231197"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2231199"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/57402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://drupal.org/node/2231671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2231191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2231197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://www.drupal.org/node/2231199"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2009-1343
Vulnerability from cvelistv5
Published
2009-04-20 14:06
Modified
2024-09-16 22:56
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles.
References
http://drupal.org/node/434748x_refsource_CONFIRM
http://www.securityfocus.com/bid/34545vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2009/1060vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/34738third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/53704vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.373Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/434748"
          },
          {
            "name": "34545",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34545"
          },
          {
            "name": "ADV-2009-1060",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1060"
          },
          {
            "name": "34738",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34738"
          },
          {
            "name": "53704",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/53704"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-04-20T14:06:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupal.org/node/434748"
        },
        {
          "name": "34545",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34545"
        },
        {
          "name": "ADV-2009-1060",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1060"
        },
        {
          "name": "34738",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34738"
        },
        {
          "name": "53704",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/53704"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1343",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.5 and 6.x before 6.x-1.5, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via content titles."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://drupal.org/node/434748",
              "refsource": "CONFIRM",
              "url": "http://drupal.org/node/434748"
            },
            {
              "name": "34545",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34545"
            },
            {
              "name": "ADV-2009-1060",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1060"
            },
            {
              "name": "34738",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34738"
            },
            {
              "name": "53704",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/53704"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1343",
    "datePublished": "2009-04-20T14:06:00Z",
    "dateReserved": "2009-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T22:56:09.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-1047
Vulnerability from cvelistv5
Published
2009-03-23 19:26
Modified
2024-08-07 04:57
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail.
References
http://osvdb.org/52852vdb-entry, x_refsource_OSVDB
http://drupal.org/node/406516x_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:57:17.526Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "52852",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/52852"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/406516"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-04-01T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "52852",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/52852"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupal.org/node/406516"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1047",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via vectors involving outbound HTML e-mail."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "52852",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/52852"
            },
            {
              "name": "http://drupal.org/node/406516",
              "refsource": "CONFIRM",
              "url": "http://drupal.org/node/406516"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1047",
    "datePublished": "2009-03-23T19:26:00",
    "dateReserved": "2009-03-23T00:00:00",
    "dateUpdated": "2024-08-07T04:57:17.526Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-1037
Vulnerability from cvelistv5
Published
2009-03-20 18:00
Modified
2024-08-07 04:57
Severity ?
Summary
Unspecified vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API.
References
http://www.securityfocus.com/bid/34173vdb-entry, x_refsource_BID
http://secunia.com/advisories/34374third-party-advisory, x_refsource_SECUNIA
http://drupal.org/node/406516x_refsource_CONFIRM
http://osvdb.org/52785vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:57:17.563Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34173",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34173"
          },
          {
            "name": "34374",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34374"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/406516"
          },
          {
            "name": "52785",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/52785"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-03-26T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34173",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34173"
        },
        {
          "name": "34374",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34374"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupal.org/node/406516"
        },
        {
          "name": "52785",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/52785"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1037",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Send by e-mail module in the \"Printer, e-mail and PDF versions\" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34173",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34173"
            },
            {
              "name": "34374",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34374"
            },
            {
              "name": "http://drupal.org/node/406516",
              "refsource": "CONFIRM",
              "url": "http://drupal.org/node/406516"
            },
            {
              "name": "52785",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/52785"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1037",
    "datePublished": "2009-03-20T18:00:00",
    "dateReserved": "2009-03-20T00:00:00",
    "dateUpdated": "2024-08-07T04:57:17.563Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-8078
Vulnerability from cvelistv5
Published
2014-10-09 14:00
Modified
2024-08-06 13:10
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes.
References
https://www.drupal.org/node/2231191x_refsource_CONFIRM
http://secunia.com/advisories/57402third-party-advisory, x_refsource_SECUNIA
https://www.drupal.org/node/2231197x_refsource_CONFIRM
https://drupal.org/node/2231671x_refsource_MISC
https://www.drupal.org/node/2231199x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/92349vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:10:50.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/node/2231191"
          },
          {
            "name": "57402",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57402"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/node/2231197"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2231671"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.drupal.org/node/2231199"
          },
          {
            "name": "print-drupal-node-xss(92349)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.drupal.org/node/2231191"
        },
        {
          "name": "57402",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57402"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.drupal.org/node/2231197"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://drupal.org/node/2231671"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.drupal.org/node/2231199"
        },
        {
          "name": "print-drupal-node-xss(92349)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-8078",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.drupal.org/node/2231191",
              "refsource": "CONFIRM",
              "url": "https://www.drupal.org/node/2231191"
            },
            {
              "name": "57402",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57402"
            },
            {
              "name": "https://www.drupal.org/node/2231197",
              "refsource": "CONFIRM",
              "url": "https://www.drupal.org/node/2231197"
            },
            {
              "name": "https://drupal.org/node/2231671",
              "refsource": "MISC",
              "url": "https://drupal.org/node/2231671"
            },
            {
              "name": "https://www.drupal.org/node/2231199",
              "refsource": "CONFIRM",
              "url": "https://www.drupal.org/node/2231199"
            },
            {
              "name": "print-drupal-node-xss(92349)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-8078",
    "datePublished": "2014-10-09T14:00:00",
    "dateReserved": "2014-10-09T00:00:00",
    "dateUpdated": "2024-08-06T13:10:50.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-1823
Vulnerability from cvelistv5
Published
2009-05-29 16:24
Modified
2024-08-07 05:27
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575.
References
http://secunia.com/advisories/35040third-party-advisory, x_refsource_SECUNIA
http://drupal.org/node/461674x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/50523vdb-entry, x_refsource_XF
http://osvdb.org/54427vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2009/1320vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/34954vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:27:54.701Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35040",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35040"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/461674"
          },
          {
            "name": "printeremailpdf-utf7-xss(50523)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523"
          },
          {
            "name": "54427",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54427"
          },
          {
            "name": "ADV-2009-1320",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1320"
          },
          {
            "name": "34954",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34954"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35040",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35040"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupal.org/node/461674"
        },
        {
          "name": "printeremailpdf-utf7-xss(50523)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523"
        },
        {
          "name": "54427",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54427"
        },
        {
          "name": "ADV-2009-1320",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1320"
        },
        {
          "name": "34954",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34954"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1823",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.7 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML by modifying a document head, before the Content-Type META element, to contain crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, a related issue to CVE-2009-1575."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35040",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35040"
            },
            {
              "name": "http://drupal.org/node/461674",
              "refsource": "CONFIRM",
              "url": "http://drupal.org/node/461674"
            },
            {
              "name": "printeremailpdf-utf7-xss(50523)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50523"
            },
            {
              "name": "54427",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54427"
            },
            {
              "name": "ADV-2009-1320",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1320"
            },
            {
              "name": "34954",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34954"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1823",
    "datePublished": "2009-05-29T16:24:00",
    "dateReserved": "2009-05-29T00:00:00",
    "dateUpdated": "2024-08-07T05:27:54.701Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}