All the vulnerabilites related to dominique_clause - search_autocomplete
Vulnerability from fkie_nvd
Published
2012-09-19 21:55
Modified
2024-11-21 01:37
Severity ?
Summary
SQL injection vulnerability in the Search Autocomplete module before 7.x-2.1 for Drupal allows remote authenticated users with the "use search_autocomplete" permission to execute arbitrary SQL commands via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dominique_clause | search_autocomplete | * | |
dominique_clause | search_autocomplete | 5.x-1.0 | |
dominique_clause | search_autocomplete | 5.x-1.0 | |
dominique_clause | search_autocomplete | 5.x-1.0 | |
dominique_clause | search_autocomplete | 5.x-1.x | |
dominique_clause | search_autocomplete | 6.x-1.0 | |
dominique_clause | search_autocomplete | 6.x-1.0 | |
dominique_clause | search_autocomplete | 6.x-2.0 | |
dominique_clause | search_autocomplete | 6.x-2.0 | |
dominique_clause | search_autocomplete | 6.x-2.1 | |
dominique_clause | search_autocomplete | 6.x-2.2 | |
dominique_clause | search_autocomplete | 6.x-2.3 | |
dominique_clause | search_autocomplete | 7.x-1.0 | |
dominique_clause | search_autocomplete | 7.x-1.0 | |
drupal | drupal | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4A9DB68-5744-4142-B777-D481FD13B741", "versionEndIncluding": "7.x-2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:5.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E2D5A0-043E-4D20-BF17-4D70097BA4E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:5.x-1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "29CEE012-5807-4A19-887C-CDAAB04534EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:5.x-1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B75B21DB-F6AC-4021-91A3-E1D6CE888C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:5.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "ACC01BD4-13D1-4D6A-8621-8CA940D3B659", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EA570BF-42DD-433D-92E6-16CECEE4805F", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:6.x-1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "C71264E6-341D-46CF-BE29-890C469EEEBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:6.x-2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB97AC51-CEC9-460D-87E3-2EAC34708650", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:6.x-2.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "556041BC-BBBA-4DA9-9B87-C0F2EE28B95B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:6.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCE1512C-A554-4D5B-9920-681C279E361A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:6.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A422FB1-A8B7-417B-AB4A-84613644C46B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:6.x-2.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B036707-3BA8-4E81-B85B-29D6A9A713C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D69DBD9-BD60-417A-8726-0F96559DF349", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:7.x-1.0:beta:*:*:*:*:*:*", "matchCriteriaId": "D01C3118-EFCC-4B27-B94F-548D27CF9A49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the Search Autocomplete module before 7.x-2.1 for Drupal allows remote authenticated users with the \"use search_autocomplete\" permission to execute arbitrary SQL commands via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo Search Autocomplete anterior a la v7.x-2.1 para Drupal, permite a usuarios remotos autenticados con los permisos para usar \"search_autocomplete\", ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-1638", "lastModified": "2024-11-21T01:37:22.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-19T21:55:03.750", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1410674" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1416612" }, { "source": "secalert@redhat.com", "url": "http://drupalcode.org/project/search_autocomplete.git/commit/589e8f6" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47731" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/51667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1410674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1416612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://drupalcode.org/project/search_autocomplete.git/commit/589e8f6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/51667" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-11-30 22:55
Modified
2024-11-21 01:42
Severity ?
Summary
The Search Autocomplete module 7.x-2.x before 7.x-2.4 for Drupal does not properly restrict access to the module admin page, which allows remote attackers to disable an autocompletion or change the priority order via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dominique_clause | search_autocomplete | 7.x-2.0 | |
dominique_clause | search_autocomplete | 7.x-2.1 | |
dominique_clause | search_autocomplete | 7.x-2.3 | |
dominique_clause | search_autocomplete | 7.x-2.x | |
drupal | drupal | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:7.x-2.0:*:*:*:*:*:*:*", "matchCriteriaId": "50192C83-466E-4E22-96ED-44B4A07A1AC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:7.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C15532F7-D727-455E-9572-FCC485B7C150", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:7.x-2.3:*:*:*:*:*:*:*", "matchCriteriaId": "21AEA84C-16EF-4CA8-B8AC-4E72F44E09B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dominique_clause:search_autocomplete:7.x-2.x:dev:*:*:*:*:*:*", "matchCriteriaId": "6C42CD22-7542-4A0B-BAE7-01E357EA0A90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Search Autocomplete module 7.x-2.x before 7.x-2.4 for Drupal does not properly restrict access to the module admin page, which allows remote attackers to disable an autocompletion or change the priority order via unspecified vectors." }, { "lang": "es", "value": "El m\u00f3dulo de Autocompletar B\u00fasqueda (\"Search Autocomplete\") v7.x-2.x antes de v7.x-2.4 para Drupal no restringe adecuadamente el acceso a la p\u00e1gina de administraci\u00f3n del m\u00f3dulo, lo que permite a atacantes remotos deshabilitar el autocompletado o cambiar el orden de prioridad a trav\u00e9s de vectores no especificados.\r\n" } ], "id": "CVE-2012-4471", "lastModified": "2024-11-21T01:42:57.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-11-30T22:55:00.987", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1649442" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1679422" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/10/04/3" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/54379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1649442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1679422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/10/04/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/54379" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2012-4471
Vulnerability from cvelistv5
Published
2012-11-30 22:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
The Search Autocomplete module 7.x-2.x before 7.x-2.4 for Drupal does not properly restrict access to the module admin page, which allows remote attackers to disable an autocompletion or change the priority order via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/10/04/3 | mailing-list, x_refsource_MLIST | |
http://drupal.org/node/1679422 | x_refsource_MISC | |
http://drupal.org/node/1649442 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/54379 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:10.045Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20121003 Re: CVE Request for Drupal Contributed Modules", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/04/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://drupal.org/node/1679422" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1649442" }, { "name": "54379", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/54379" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The Search Autocomplete module 7.x-2.x before 7.x-2.4 for Drupal does not properly restrict access to the module admin page, which allows remote attackers to disable an autocompletion or change the priority order via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-01-29T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20121003 Re: CVE Request for Drupal Contributed Modules", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/10/04/3" }, { "tags": [ "x_refsource_MISC" ], "url": "http://drupal.org/node/1679422" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1649442" }, { "name": "54379", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/54379" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Search Autocomplete module 7.x-2.x before 7.x-2.4 for Drupal does not properly restrict access to the module admin page, which allows remote attackers to disable an autocompletion or change the priority order via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20121003 Re: CVE Request for Drupal Contributed Modules", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/10/04/3" }, { "name": "http://drupal.org/node/1679422", "refsource": "MISC", "url": "http://drupal.org/node/1679422" }, { "name": "http://drupal.org/node/1649442", "refsource": "CONFIRM", "url": "http://drupal.org/node/1649442" }, { "name": "54379", "refsource": "BID", "url": "http://www.securityfocus.com/bid/54379" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4471", "datePublished": "2012-11-30T22:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:10.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1638
Vulnerability from cvelistv5
Published
2012-09-19 21:00
Modified
2024-09-17 00:26
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in the Search Autocomplete module before 7.x-2.1 for Drupal allows remote authenticated users with the "use search_autocomplete" permission to execute arbitrary SQL commands via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/47731 | third-party-advisory, x_refsource_SECUNIA | |
http://drupal.org/node/1410674 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/04/07/1 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/51667 | vdb-entry, x_refsource_BID | |
http://drupal.org/node/1416612 | x_refsource_CONFIRM | |
http://drupalcode.org/project/search_autocomplete.git/commit/589e8f6 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "47731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47731" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1410674" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "name": "51667", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51667" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1416612" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupalcode.org/project/search_autocomplete.git/commit/589e8f6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in the Search Autocomplete module before 7.x-2.1 for Drupal allows remote authenticated users with the \"use search_autocomplete\" permission to execute arbitrary SQL commands via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-19T21:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "47731", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47731" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1410674" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "name": "51667", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51667" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1416612" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupalcode.org/project/search_autocomplete.git/commit/589e8f6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1638", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in the Search Autocomplete module before 7.x-2.1 for Drupal allows remote authenticated users with the \"use search_autocomplete\" permission to execute arbitrary SQL commands via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "47731", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47731" }, { "name": "http://drupal.org/node/1410674", "refsource": "CONFIRM", "url": "http://drupal.org/node/1410674" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "name": "51667", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51667" }, { "name": "http://drupal.org/node/1416612", "refsource": "CONFIRM", "url": "http://drupal.org/node/1416612" }, { "name": "http://drupalcode.org/project/search_autocomplete.git/commit/589e8f6", "refsource": "CONFIRM", "url": "http://drupalcode.org/project/search_autocomplete.git/commit/589e8f6" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1638", "datePublished": "2012-09-19T21:00:00Z", "dateReserved": "2012-03-12T00:00:00Z", "dateUpdated": "2024-09-17T00:26:35.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }