All the vulnerabilites related to joao_ventura - print
Vulnerability from fkie_nvd
Published
2012-11-22 12:28
Modified
2024-11-21 01:38
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Printer, email and PDF versions module 6.x-1.x before 6.x-1.15 and 7.x-1.x before 7.x-1.0 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably the PATH_INFO.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.1 | ||
joao_ventura | 6.x-1.2 | ||
joao_ventura | 6.x-1.3 | ||
joao_ventura | 6.x-1.4 | ||
joao_ventura | 6.x-1.5 | ||
joao_ventura | 6.x-1.6 | ||
joao_ventura | 6.x-1.7 | ||
joao_ventura | 6.x-1.8 | ||
joao_ventura | 6.x-1.9 | ||
joao_ventura | 6.x-1.10 | ||
joao_ventura | 6.x-1.11 | ||
joao_ventura | 6.x-1.11 | ||
joao_ventura | 6.x-1.12 | ||
joao_ventura | 6.x-1.13 | ||
joao_ventura | 6.x-1.14 | ||
joao_ventura | 6.x-1.x | ||
joao_ventura | 7.x-10 | ||
joao_ventura | 7.x-10 | ||
joao_ventura | 7.x-10 | ||
joao_ventura | 7.x-10 | ||
joao_ventura | 7.x-10 | ||
drupal | drupal | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "86C1B4CE-7783-4A6F-9FED-82B3A70DA5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B841C77C-FEF8-4253-9887-9CE4942431DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "15C9FE51-FD7F-472F-8C44-EA20578244CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "D11FD1BF-ABD6-4D38-96C8-2E32CBD9473D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5F787E18-3790-4F33-928F-59E2398FB76D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A156B352-D91A-4408-8240-88EAACA55B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "8BC82E86-F2AB-4FF8-98C5-1A35D467C358", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc9:*:*:*:*:*:*", "matchCriteriaId": "EC8E8F4D-D9FF-4A9D-9861-E1C5A9C6DBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "938C1B6D-7449-49C9-853F-2AD939E784B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "15BA3E26-5B28-4DFD-8B6B-24119139B274", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD23BBD1-7550-4D9B-9A88-12B2E5F20189", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD0BC0-AEC5-4DD5-986A-F6B0CADD9368", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A819F021-0530-4AE3-802F-E73C6669D607", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C8453CB-2E8E-4108-81C2-A7B2B61C44AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "99B1C895-6087-4D83-9347-760CCEB1E41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7DEFD55E-FBD8-47A2-866A-5BE6633AF903", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "EC8B9BD9-FA6B-4D0F-885D-869047BAB648", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "DB01BAC1-6C14-4BD9-A2B3-7C6E3B2138AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "C147DF98-8C40-4B5F-8019-79833A980154", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.11:beta1:*:*:*:*:*:*", "matchCriteriaId": "3BD98360-4140-44A5-9784-8098129971C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "2FA087FD-88BF-45A9-BC7F-36DFC6DF7C0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.13:*:*:*:*:*:*:*", "matchCriteriaId": "FD4A18AF-FED1-4994-A3FE-22ED99344A72", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.14:*:*:*:*:*:*:*", "matchCriteriaId": "4A7554D6-A660-42D8-B9F6-D7FFA4DFF6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "EAB1161E-7EA1-4D1B-BFC0-042F813E1148", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:7.x-10:alpha1:*:*:*:*:*:*", "matchCriteriaId": "8B0029D6-E583-45CD-A221-3A2CE72B858D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:7.x-10:alpha2:*:*:*:*:*:*", "matchCriteriaId": "CC96E63E-C8EC-40C3-AC01-B2E6940A5994", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:7.x-10:beta1:*:*:*:*:*:*", "matchCriteriaId": "86A6667B-6DE1-44D3-B4D7-489F8E7A2184", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:7.x-10:beta2:*:*:*:*:*:*", "matchCriteriaId": "45CD5D1B-4CF9-410F-95C2-ED306155197D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:7.x-10:dev:*:*:*:*:*:*", "matchCriteriaId": "C999C63C-6793-4022-AF9A-1CE108C0BB43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Printer, email and PDF versions module 6.x-1.x before 6.x-1.15 and 7.x-1.x before 7.x-1.0 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably the PATH_INFO." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo de impresi\u00f3n, correo electr\u00f3nico y PDF versiones 6.x-1.x antes de 6.x-1.15 y 7.x-1.x antes 7.x-1.0 para Drupal, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s vectores no especificados, probablemente el PATH_INFO." } ], "id": "CVE-2012-2084", "lastModified": "2024-11-21T01:38:27.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-11-22T12:28:38.773", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1515060" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1515076" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1515722" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupalcode.org/project/print.git/commit/30480e0" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupalcode.org/project/print.git/commit/6771c3f" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48625" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52896" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1515060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1515076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1515722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupalcode.org/project/print.git/commit/30480e0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupalcode.org/project/print.git/commit/6771c3f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74611" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-16 17:30
Modified
2024-11-21 01:06
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.8 and 6.x before 6.x-1.8, a module for Drupal, allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://drupal.org/node/554326 | Patch, Vendor Advisory | |
cve@mitre.org | http://drupal.org/node/554328 | Patch, Vendor Advisory | |
cve@mitre.org | http://drupal.org/node/554448 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/36395 | Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/57192 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/52593 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://drupal.org/node/554326 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://drupal.org/node/554328 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://drupal.org/node/554448 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36395 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/57192 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/52593 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
drupal | drupal | * | |
joao_ventura | 5.x-2.2 | ||
joao_ventura | 5.x-3.0 | ||
joao_ventura | 5.x-3.1 | ||
joao_ventura | 5.x-3.2 | ||
joao_ventura | 5.x-3.3 | ||
joao_ventura | 5.x-3.4 | ||
joao_ventura | 5.x-3.5 | ||
joao_ventura | 5.x-3.6 | ||
joao_ventura | 5.x-3.7 | ||
joao_ventura | 5.x-3.x-dev | ||
joao_ventura | 5.x-4.0 | ||
joao_ventura | 5.x-4.1 | ||
joao_ventura | 5.x-4.2 | ||
joao_ventura | 5.x-4.3 | ||
joao_ventura | 5.x-4.4 | ||
joao_ventura | 5.x-4.5 | ||
joao_ventura | 5.x-4.6 | ||
joao_ventura | 5.x-4.7 | ||
joao_ventura | 5.x-4.x-dev | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.1 | ||
joao_ventura | 6.x-1.2 | ||
joao_ventura | 6.x-1.3 | ||
joao_ventura | 6.x-1.4 | ||
joao_ventura | 6.x-1.5 | ||
joao_ventura | 6.x-1.6 | ||
joao_ventura | 6.x-1.7 | ||
joao_ventura | 6.x-1.x-dev |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2893881B-C60B-4786-9C96-642840809B9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF7F4CFF-4DE4-44CC-A1AF-8A1AEB8E6A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF1CFCAA-B1C3-4786-8DDA-692F5469A559", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2301487B-942B-4F0B-9E45-05AC26902DF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A355B60A-196D-450D-9234-509C2977575A", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.4:*:*:*:*:*:*:*", "matchCriteriaId": "E3504933-2428-4F1B-B9A1-4883CD7246FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.5:*:*:*:*:*:*:*", "matchCriteriaId": "E950A2A1-2A92-4A26-88CE-1806BE758B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.6:*:*:*:*:*:*:*", "matchCriteriaId": "751FE639-78A3-4B8A-B5BC-478C4C9E7411", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.7:*:*:*:*:*:*:*", "matchCriteriaId": "ABBDB896-8B17-4A6B-A36D-57A39ED12C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-3.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "A4C15189-5BA1-413F-9B61-D8F41DCF4686", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.0:*:*:*:*:*:*:*", "matchCriteriaId": "929EF949-E619-4663-8E5A-32DC1FB759F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46041FE-A508-42CE-A944-08A2590DFEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.2:*:*:*:*:*:*:*", "matchCriteriaId": "026E16DA-B5ED-4295-8A90-91C4039BB4E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.3:*:*:*:*:*:*:*", "matchCriteriaId": "570C4DBC-86CE-42AF-81D6-9D8A4C0E9233", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.4:*:*:*:*:*:*:*", "matchCriteriaId": "871017DE-E12E-495D-A208-07EE6CCDF4A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6F9EAB0F-606A-4D87-A704-56A7A54CAA9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBC7558-7A67-41C0-BDDC-ED32645F387B", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.7:*:*:*:*:*:*:*", "matchCriteriaId": "605EC83A-E689-4D45-AB0E-1B8B3A7D9CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "D0A17598-3ED7-4B2A-B4F8-0B7425CFF6E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "86C1B4CE-7783-4A6F-9FED-82B3A70DA5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B841C77C-FEF8-4253-9887-9CE4942431DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "15C9FE51-FD7F-472F-8C44-EA20578244CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "D11FD1BF-ABD6-4D38-96C8-2E32CBD9473D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5F787E18-3790-4F33-928F-59E2398FB76D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A156B352-D91A-4408-8240-88EAACA55B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "8BC82E86-F2AB-4FF8-98C5-1A35D467C358", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc9:*:*:*:*:*:*", "matchCriteriaId": "EC8E8F4D-D9FF-4A9D-9861-E1C5A9C6DBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "938C1B6D-7449-49C9-853F-2AD939E784B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "15BA3E26-5B28-4DFD-8B6B-24119139B274", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD23BBD1-7550-4D9B-9A88-12B2E5F20189", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD0BC0-AEC5-4DD5-986A-F6B0CADD9368", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A819F021-0530-4AE3-802F-E73C6669D607", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C8453CB-2E8E-4108-81C2-A7B2B61C44AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "99B1C895-6087-4D83-9347-760CCEB1E41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "290B7085-8CC9-494E-85F7-28BE1A32E975", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.8 and 6.x before 6.x-1.8, a module for Drupal, allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados en el m\u00f3dulo Print (tambi\u00e9n conocido como Printer, versi\u00f3n para e-mail y PDF) v5.x anterior a v5.x-4.8 y v6.x anterior a v6.x-1.8 para Drupal, permite a usuarios autenticados inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2009-3210", "lastModified": "2024-11-21T01:06:47.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-09-16T17:30:00.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/554326" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/554328" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/554448" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36395" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/57192" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/554326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/554328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/554448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/57192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52593" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-12-31 19:30
Modified
2024-11-21 01:09
Severity ?
Summary
The Send by e-mail sub-module in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, does not properly enforce privilege requirements, which allows remote attackers to read page titles by requesting a "Send to friend" form.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
joao_ventura | 5.x-4.0 | ||
joao_ventura | 5.x-4.1 | ||
joao_ventura | 5.x-4.2 | ||
joao_ventura | 5.x-4.3 | ||
joao_ventura | 5.x-4.4 | ||
joao_ventura | 5.x-4.5 | ||
joao_ventura | 5.x-4.6 | ||
joao_ventura | 5.x-4.7 | ||
joao_ventura | 5.x-4.8 | ||
joao_ventura | 5.x-4.x | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.1 | ||
joao_ventura | 6.x-1.2 | ||
joao_ventura | 6.x-1.3 | ||
joao_ventura | 6.x-1.4 | ||
joao_ventura | 6.x-1.5 | ||
joao_ventura | 6.x-1.6 | ||
joao_ventura | 6.x-1.7 | ||
joao_ventura | 6.x-1.x | ||
drupal | drupal | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.0:*:*:*:*:*:*:*", "matchCriteriaId": "929EF949-E619-4663-8E5A-32DC1FB759F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46041FE-A508-42CE-A944-08A2590DFEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.2:*:*:*:*:*:*:*", "matchCriteriaId": "026E16DA-B5ED-4295-8A90-91C4039BB4E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.3:*:*:*:*:*:*:*", "matchCriteriaId": "570C4DBC-86CE-42AF-81D6-9D8A4C0E9233", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.4:*:*:*:*:*:*:*", "matchCriteriaId": "871017DE-E12E-495D-A208-07EE6CCDF4A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6F9EAB0F-606A-4D87-A704-56A7A54CAA9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBC7558-7A67-41C0-BDDC-ED32645F387B", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.7:*:*:*:*:*:*:*", "matchCriteriaId": "605EC83A-E689-4D45-AB0E-1B8B3A7D9CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.8:*:*:*:*:*:*:*", "matchCriteriaId": "16BC9CFA-00FF-4FA2-9D34-0975260E28E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.x:dev:*:*:*:*:*:*", "matchCriteriaId": "08171429-10CC-44C3-A9BB-1E3A2CF6FF87", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "86C1B4CE-7783-4A6F-9FED-82B3A70DA5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B841C77C-FEF8-4253-9887-9CE4942431DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "15C9FE51-FD7F-472F-8C44-EA20578244CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "D11FD1BF-ABD6-4D38-96C8-2E32CBD9473D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5F787E18-3790-4F33-928F-59E2398FB76D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A156B352-D91A-4408-8240-88EAACA55B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "8BC82E86-F2AB-4FF8-98C5-1A35D467C358", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc9:*:*:*:*:*:*", "matchCriteriaId": "EC8E8F4D-D9FF-4A9D-9861-E1C5A9C6DBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "938C1B6D-7449-49C9-853F-2AD939E784B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "15BA3E26-5B28-4DFD-8B6B-24119139B274", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD23BBD1-7550-4D9B-9A88-12B2E5F20189", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD0BC0-AEC5-4DD5-986A-F6B0CADD9368", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A819F021-0530-4AE3-802F-E73C6669D607", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C8453CB-2E8E-4108-81C2-A7B2B61C44AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "99B1C895-6087-4D83-9347-760CCEB1E41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "EAB1161E-7EA1-4D1B-BFC0-042F813E1148", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Send by e-mail sub-module in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, does not properly enforce privilege requirements, which allows remote attackers to read page titles by requesting a \"Send to friend\" form." }, { "lang": "es", "value": "El sub-m\u00f3dulo Send by e-mail en el m\u00f3dulo Print (tambi\u00e9n conocido como Printer, e-mail y versiones PDF) v5.x anterior a v5.x-4.9 y v6.x anterior a v6.x-1.9, para Drupal, no refuerza adecuadamente los privilegios, lo que permite a atacantes remotos leer los t\u00edtulos de p\u00e1gina solicitando un formulario \"Send to a Friend\" (Enviar a un amigo)." } ], "id": "CVE-2009-4526", "lastModified": "2024-11-21T01:09:50.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-12-31T19:30:00.563", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://drupal.org/node/604804" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://drupal.org/node/604806" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/604808" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/58951" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37059" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36707" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/604804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/604806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/604808" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/58951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2922" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-12-31 19:30
Modified
2024-11-21 01:09
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via crafted data in a list of links.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
joao_ventura | 5.x-4.0 | ||
joao_ventura | 5.x-4.1 | ||
joao_ventura | 5.x-4.2 | ||
joao_ventura | 5.x-4.3 | ||
joao_ventura | 5.x-4.4 | ||
joao_ventura | 5.x-4.5 | ||
joao_ventura | 5.x-4.6 | ||
joao_ventura | 5.x-4.7 | ||
joao_ventura | 5.x-4.8 | ||
joao_ventura | 5.x-4.x | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.0 | ||
joao_ventura | 6.x-1.1 | ||
joao_ventura | 6.x-1.2 | ||
joao_ventura | 6.x-1.3 | ||
joao_ventura | 6.x-1.4 | ||
joao_ventura | 6.x-1.5 | ||
joao_ventura | 6.x-1.6 | ||
joao_ventura | 6.x-1.7 | ||
joao_ventura | 6.x-1.x | ||
drupal | drupal | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.0:*:*:*:*:*:*:*", "matchCriteriaId": "929EF949-E619-4663-8E5A-32DC1FB759F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E46041FE-A508-42CE-A944-08A2590DFEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.2:*:*:*:*:*:*:*", "matchCriteriaId": "026E16DA-B5ED-4295-8A90-91C4039BB4E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.3:*:*:*:*:*:*:*", "matchCriteriaId": "570C4DBC-86CE-42AF-81D6-9D8A4C0E9233", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.4:*:*:*:*:*:*:*", "matchCriteriaId": "871017DE-E12E-495D-A208-07EE6CCDF4A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.5:*:*:*:*:*:*:*", "matchCriteriaId": "6F9EAB0F-606A-4D87-A704-56A7A54CAA9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DBBC7558-7A67-41C0-BDDC-ED32645F387B", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.7:*:*:*:*:*:*:*", "matchCriteriaId": "605EC83A-E689-4D45-AB0E-1B8B3A7D9CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.8:*:*:*:*:*:*:*", "matchCriteriaId": "16BC9CFA-00FF-4FA2-9D34-0975260E28E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:5.x-4.x:dev:*:*:*:*:*:*", "matchCriteriaId": "08171429-10CC-44C3-A9BB-1E3A2CF6FF87", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "86C1B4CE-7783-4A6F-9FED-82B3A70DA5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B841C77C-FEF8-4253-9887-9CE4942431DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "15C9FE51-FD7F-472F-8C44-EA20578244CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "D11FD1BF-ABD6-4D38-96C8-2E32CBD9473D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "5F787E18-3790-4F33-928F-59E2398FB76D", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A156B352-D91A-4408-8240-88EAACA55B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "8BC82E86-F2AB-4FF8-98C5-1A35D467C358", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.0:rc9:*:*:*:*:*:*", "matchCriteriaId": "EC8E8F4D-D9FF-4A9D-9861-E1C5A9C6DBCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "938C1B6D-7449-49C9-853F-2AD939E784B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "15BA3E26-5B28-4DFD-8B6B-24119139B274", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD23BBD1-7550-4D9B-9A88-12B2E5F20189", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E1FD0BC0-AEC5-4DD5-986A-F6B0CADD9368", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A819F021-0530-4AE3-802F-E73C6669D607", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1C8453CB-2E8E-4108-81C2-A7B2B61C44AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "99B1C895-6087-4D83-9347-760CCEB1E41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:joao_ventura:print:6.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "EAB1161E-7EA1-4D1B-BFC0-042F813E1148", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via crafted data in a list of links." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Print (tambi\u00e9n conocido como Printer, para versiones de correo electr\u00f3nico y PDF) v5.x anterior a v5.x-4.9 y v6.x anterior a v6.x-1.9, un m\u00f3dulo para Drupal, permite a atacantes remotos inyectar secuencias de comandos Web o HTML a trav\u00e9s de un dato manipulado en una lista de enlaces." } ], "id": "CVE-2009-4525", "lastModified": "2024-11-21T01:09:50.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-12-31T19:30:00.530", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://drupal.org/node/604804" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://drupal.org/node/604806" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/604808" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/58952" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37059" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/36707" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/604804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/604806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/604808" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/58952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53789" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2009-3210
Vulnerability from cvelistv5
Published
2009-09-16 17:00
Modified
2024-08-07 06:14
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.8 and 6.x before 6.x-1.8, a module for Drupal, allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/57192 | vdb-entry, x_refsource_OSVDB | |
http://drupal.org/node/554326 | x_refsource_CONFIRM | |
http://drupal.org/node/554448 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/52593 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/36395 | third-party-advisory, x_refsource_SECUNIA | |
http://drupal.org/node/554328 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:14:56.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "57192", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/57192" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/554326" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/554448" }, { "name": "printeremailpdf-drupal-unspecified-xss(52593)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52593" }, { "name": "36395", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36395" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/554328" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.8 and 6.x before 6.x-1.8, a module for Drupal, allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "57192", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/57192" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/554326" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/554448" }, { "name": "printeremailpdf-drupal-unspecified-xss(52593)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52593" }, { "name": "36395", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36395" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/554328" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3210", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.8 and 6.x before 6.x-1.8, a module for Drupal, allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "57192", "refsource": "OSVDB", "url": "http://www.osvdb.org/57192" }, { "name": "http://drupal.org/node/554326", "refsource": "CONFIRM", "url": "http://drupal.org/node/554326" }, { "name": "http://drupal.org/node/554448", "refsource": "CONFIRM", "url": "http://drupal.org/node/554448" }, { "name": "printeremailpdf-drupal-unspecified-xss(52593)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52593" }, { "name": "36395", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36395" }, { "name": "http://drupal.org/node/554328", "refsource": "CONFIRM", "url": "http://drupal.org/node/554328" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3210", "datePublished": "2009-09-16T17:00:00", "dateReserved": "2009-09-16T00:00:00", "dateUpdated": "2024-08-07T06:14:56.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2084
Vulnerability from cvelistv5
Published
2012-11-22 11:00
Modified
2024-08-06 19:17
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Printer, email and PDF versions module 6.x-1.x before 6.x-1.15 and 7.x-1.x before 7.x-1.0 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably the PATH_INFO.
References
▼ | URL | Tags |
---|---|---|
http://drupalcode.org/project/print.git/commit/30480e0 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74611 | vdb-entry, x_refsource_XF | |
http://drupalcode.org/project/print.git/commit/6771c3f | x_refsource_CONFIRM | |
http://drupal.org/node/1515722 | x_refsource_MISC | |
http://drupal.org/node/1515060 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/52896 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2012/04/07/1 | mailing-list, x_refsource_MLIST | |
http://drupal.org/node/1515076 | x_refsource_CONFIRM | |
http://secunia.com/advisories/48625 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupalcode.org/project/print.git/commit/30480e0" }, { "name": "printeremailpdfversions-unspecified-xss(74611)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74611" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupalcode.org/project/print.git/commit/6771c3f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://drupal.org/node/1515722" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1515060" }, { "name": "52896", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52896" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1515076" }, { "name": "48625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48625" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Printer, email and PDF versions module 6.x-1.x before 6.x-1.15 and 7.x-1.x before 7.x-1.0 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably the PATH_INFO." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupalcode.org/project/print.git/commit/30480e0" }, { "name": "printeremailpdfversions-unspecified-xss(74611)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74611" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupalcode.org/project/print.git/commit/6771c3f" }, { "tags": [ "x_refsource_MISC" ], "url": "http://drupal.org/node/1515722" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1515060" }, { "name": "52896", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52896" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1515076" }, { "name": "48625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48625" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Printer, email and PDF versions module 6.x-1.x before 6.x-1.15 and 7.x-1.x before 7.x-1.0 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably the PATH_INFO." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://drupalcode.org/project/print.git/commit/30480e0", "refsource": "CONFIRM", "url": "http://drupalcode.org/project/print.git/commit/30480e0" }, { "name": "printeremailpdfversions-unspecified-xss(74611)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74611" }, { "name": "http://drupalcode.org/project/print.git/commit/6771c3f", "refsource": "CONFIRM", "url": "http://drupalcode.org/project/print.git/commit/6771c3f" }, { "name": "http://drupal.org/node/1515722", "refsource": "MISC", "url": "http://drupal.org/node/1515722" }, { "name": "http://drupal.org/node/1515060", "refsource": "CONFIRM", "url": "http://drupal.org/node/1515060" }, { "name": "52896", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52896" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "name": "http://drupal.org/node/1515076", "refsource": "CONFIRM", "url": "http://drupal.org/node/1515076" }, { "name": "48625", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48625" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2084", "datePublished": "2012-11-22T11:00:00", "dateReserved": "2012-04-04T00:00:00", "dateUpdated": "2024-08-06T19:17:27.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4526
Vulnerability from cvelistv5
Published
2009-12-31 19:00
Modified
2024-09-16 16:52
Severity ?
EPSS score ?
Summary
The Send by e-mail sub-module in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, does not properly enforce privilege requirements, which allows remote attackers to read page titles by requesting a "Send to friend" form.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2009/2922 | vdb-entry, x_refsource_VUPEN | |
http://drupal.org/node/604806 | x_refsource_CONFIRM | |
http://osvdb.org/58951 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/37059 | third-party-advisory, x_refsource_SECUNIA | |
http://drupal.org/node/604808 | x_refsource_CONFIRM | |
http://drupal.org/node/604804 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/36707 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:08:37.983Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-2922", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/604806" }, { "name": "58951", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58951" }, { "name": "37059", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37059" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/604808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/604804" }, { "name": "36707", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36707" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Send by e-mail sub-module in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, does not properly enforce privilege requirements, which allows remote attackers to read page titles by requesting a \"Send to friend\" form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-12-31T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-2922", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/604806" }, { "name": "58951", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58951" }, { "name": "37059", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37059" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/604808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/604804" }, { "name": "36707", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36707" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4526", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Send by e-mail sub-module in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, does not properly enforce privilege requirements, which allows remote attackers to read page titles by requesting a \"Send to friend\" form." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-2922", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "name": "http://drupal.org/node/604806", "refsource": "CONFIRM", "url": "http://drupal.org/node/604806" }, { "name": "58951", "refsource": "OSVDB", "url": "http://osvdb.org/58951" }, { "name": "37059", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37059" }, { "name": "http://drupal.org/node/604808", "refsource": "CONFIRM", "url": "http://drupal.org/node/604808" }, { "name": "http://drupal.org/node/604804", "refsource": "CONFIRM", "url": "http://drupal.org/node/604804" }, { "name": "36707", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36707" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4526", "datePublished": "2009-12-31T19:00:00Z", "dateReserved": "2009-12-31T00:00:00Z", "dateUpdated": "2024-09-16T16:52:49.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4525
Vulnerability from cvelistv5
Published
2009-12-31 19:00
Modified
2024-08-07 07:08
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via crafted data in a list of links.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2009/2922 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53789 | vdb-entry, x_refsource_XF | |
http://drupal.org/node/604806 | x_refsource_CONFIRM | |
http://secunia.com/advisories/37059 | third-party-advisory, x_refsource_SECUNIA | |
http://drupal.org/node/604808 | x_refsource_CONFIRM | |
http://drupal.org/node/604804 | x_refsource_CONFIRM | |
http://osvdb.org/58952 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/36707 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:08:38.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-2922", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "name": "printeremailpdf-links-xss(53789)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53789" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/604806" }, { "name": "37059", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37059" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/604808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/604804" }, { "name": "58952", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/58952" }, { "name": "36707", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36707" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via crafted data in a list of links." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-2922", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "name": "printeremailpdf-links-xss(53789)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53789" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/604806" }, { "name": "37059", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37059" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/604808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/604804" }, { "name": "58952", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/58952" }, { "name": "36707", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36707" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 5.x before 5.x-4.9 and 6.x before 6.x-1.9, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via crafted data in a list of links." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-2922", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2922" }, { "name": "printeremailpdf-links-xss(53789)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53789" }, { "name": "http://drupal.org/node/604806", "refsource": "CONFIRM", "url": "http://drupal.org/node/604806" }, { "name": "37059", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37059" }, { "name": "http://drupal.org/node/604808", "refsource": "CONFIRM", "url": "http://drupal.org/node/604808" }, { "name": "http://drupal.org/node/604804", "refsource": "CONFIRM", "url": "http://drupal.org/node/604804" }, { "name": "58952", "refsource": "OSVDB", "url": "http://osvdb.org/58952" }, { "name": "36707", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36707" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4525", "datePublished": "2009-12-31T19:00:00", "dateReserved": "2009-12-31T00:00:00", "dateUpdated": "2024-08-07T07:08:38.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }