All the vulnerabilites related to marvil07 - vote_up_down
Vulnerability from fkie_nvd
Published
2012-09-20 00:55
Modified
2024-11-21 01:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in vud_term.module in the Vote Up/Down module 6.x-2.x before 6.x-2.8 and 6.x-3.x before 6.x-3.1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via taxonomy terms.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
marvil07 | vote_up_down | 6.x-2.0 | |
marvil07 | vote_up_down | 6.x-2.0 | |
marvil07 | vote_up_down | 6.x-2.0 | |
marvil07 | vote_up_down | 6.x-2.0 | |
marvil07 | vote_up_down | 6.x-2.1 | |
marvil07 | vote_up_down | 6.x-2.2 | |
marvil07 | vote_up_down | 6.x-2.3 | |
marvil07 | vote_up_down | 6.x-2.4 | |
marvil07 | vote_up_down | 6.x-2.5 | |
marvil07 | vote_up_down | 6.x-2.6 | |
marvil07 | vote_up_down | 6.x-2.7 | |
marvil07 | vote_up_down | 6.x-2.x | |
drupal | drupal | - | |
marvil07 | vote_up_down | 6.x-3.0 | |
marvil07 | vote_up_down | 6.x-3.0 | |
marvil07 | vote_up_down | 6.x-3.0 | |
marvil07 | vote_up_down | 6.x-3.x | |
drupal | drupal | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B907789-ED9B-49DE-8C2F-29CAC5EBA1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "82F35C91-F4A9-46FE-9CCF-142F19B5CD27", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "68BEFB84-92B6-4C98-BA2A-C54F261337A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "AD13A4C8-202E-4AF6-8CB3-FE8F444DD274", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E429C-9D6B-43A6-91A9-879FD5D4CC92", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6E886F2B-26A2-46D8-84AF-997E91167094", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBC1ADD4-DE7C-461C-AB59-A446989DBE07", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0AE6ACFB-7DC9-48DB-802B-8AFB99533A3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.5:*:*:*:*:*:*:*", "matchCriteriaId": "0E9B9549-14F2-404D-9F75-8FF56D00DEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.6:*:*:*:*:*:*:*", "matchCriteriaId": "713FC890-282F-4BCC-9466-19F5025886C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.7:*:*:*:*:*:*:*", "matchCriteriaId": "61DC774A-C3DF-4307-9111-8B45AE079362", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.x:dev:*:*:*:*:*:*", "matchCriteriaId": "319D534E-1670-4384-83E4-3871510545CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C22BF4F-084B-4BDD-A8B7-8EE95DFC5A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "8E0D3599-C980-4C51-8998-E7A4E05B1459", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "05B7485A-E39C-482E-A396-17371629EEFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.x:dev:*:*:*:*:*:*", "matchCriteriaId": "838E6FB9-3A6A-449D-BD60-517E1A306159", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in vud_term.module in the Vote Up/Down module 6.x-2.x before 6.x-2.8 and 6.x-3.x before 6.x-3.1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via taxonomy terms." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en vud_term en el m\u00f3dulo Vote Up/Down v6.x-2.x anterior a v6.x-2.8 y v6.x-3.x anterior a v6.x-3.1 para Drupal, permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de t\u00e9rminos en las taxonom\u00edas." } ], "id": "CVE-2012-1627", "lastModified": "2024-11-21T01:37:21.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-09-20T00:55:04.843", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1400528" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupal.org/node/1400530" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1401580" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47549" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/51376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1400528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupal.org/node/1400530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://drupal.org/node/1401580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51376" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2012-1627
Vulnerability from cvelistv5
Published
2012-09-20 00:00
Modified
2024-09-16 18:49
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in vud_term.module in the Vote Up/Down module 6.x-2.x before 6.x-2.8 and 6.x-3.x before 6.x-3.1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via taxonomy terms.
References
▼ | URL | Tags |
---|---|---|
http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0 | x_refsource_CONFIRM | |
http://drupal.org/node/1401580 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/04/07/1 | mailing-list, x_refsource_MLIST | |
http://drupal.org/node/1400530 | x_refsource_CONFIRM | |
http://drupal.org/node/1400528 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/51376 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/47549 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://drupal.org/node/1401580" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1400530" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1400528" }, { "name": "51376", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51376" }, { "name": "47549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in vud_term.module in the Vote Up/Down module 6.x-2.x before 6.x-2.8 and 6.x-3.x before 6.x-3.1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via taxonomy terms." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-20T00:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0" }, { "tags": [ "x_refsource_MISC" ], "url": "http://drupal.org/node/1401580" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1400530" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1400528" }, { "name": "51376", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51376" }, { "name": "47549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47549" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in vud_term.module in the Vote Up/Down module 6.x-2.x before 6.x-2.8 and 6.x-3.x before 6.x-3.1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via taxonomy terms." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0", "refsource": "CONFIRM", "url": "http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0" }, { "name": "http://drupal.org/node/1401580", "refsource": "MISC", "url": "http://drupal.org/node/1401580" }, { "name": "[oss-security] 20120406 CVE\u0027s for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1" }, { "name": "http://drupal.org/node/1400530", "refsource": "CONFIRM", "url": "http://drupal.org/node/1400530" }, { "name": "http://drupal.org/node/1400528", "refsource": "CONFIRM", "url": "http://drupal.org/node/1400528" }, { "name": "51376", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51376" }, { "name": "47549", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47549" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1627", "datePublished": "2012-09-20T00:00:00Z", "dateReserved": "2012-03-12T00:00:00Z", "dateUpdated": "2024-09-16T18:49:47.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }