CVE-2015-6665
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the "a" tag.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-14442", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html" }, { "name": "FEDORA-2015-14329", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html" }, { "name": "FEDORA-2015-13915", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html" }, { "name": "1033358", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033358" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.drupal.org/node/2554145" }, { "name": "FEDORA-2015-14443", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html" }, { "name": "FEDORA-2015-13917", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html" }, { "name": "76431", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76431" }, { "name": "DSA-3346", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.drupal.org/SA-CORE-2015-003" }, { "name": "FEDORA-2015-14444", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.drupal.org/node/2554133" }, { "name": "FEDORA-2015-14330", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html" }, { "name": "FEDORA-2015-13916", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html" }, { "name": "FEDORA-2015-14331", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the \"a\" tag." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2015-14442", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html" }, { "name": "FEDORA-2015-14329", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html" }, { "name": "FEDORA-2015-13915", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html" }, { "name": "1033358", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033358" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.drupal.org/node/2554145" }, { "name": "FEDORA-2015-14443", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html" }, { "name": "FEDORA-2015-13917", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html" }, { "name": "76431", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76431" }, { "name": "DSA-3346", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.drupal.org/SA-CORE-2015-003" }, { "name": "FEDORA-2015-14444", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.drupal.org/node/2554133" }, { "name": "FEDORA-2015-14330", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html" }, { "name": "FEDORA-2015-13916", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html" }, { "name": "FEDORA-2015-14331", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6665", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the \"a\" tag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-14442", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html" }, { "name": "FEDORA-2015-14329", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html" }, { "name": "FEDORA-2015-13915", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html" }, { "name": "1033358", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033358" }, { "name": "https://www.drupal.org/node/2554145", "refsource": "MISC", "url": "https://www.drupal.org/node/2554145" }, { "name": "FEDORA-2015-14443", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html" }, { "name": "FEDORA-2015-13917", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html" }, { "name": "76431", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76431" }, { "name": "DSA-3346", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3346" }, { "name": "https://www.drupal.org/SA-CORE-2015-003", "refsource": "CONFIRM", "url": "https://www.drupal.org/SA-CORE-2015-003" }, { "name": "FEDORA-2015-14444", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html" }, { "name": "https://www.drupal.org/node/2554133", "refsource": "CONFIRM", "url": "https://www.drupal.org/node/2554133" }, { "name": "FEDORA-2015-14330", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html" }, { "name": "FEDORA-2015-13916", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html" }, { "name": "FEDORA-2015-14331", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6665", "datePublished": "2015-08-24T14:00:00", "dateReserved": "2015-08-24T00:00:00", "dateUpdated": "2024-08-06T07:29:24.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56BDB5A0-0839-4A20-A003-B8CD56F48171\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"253C303A-E577-4488-93E6-68A8DD942C38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E79AB8DD-C907-4038-A931-1A5A4CFB6A5B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48C33CAB-4633-418C-B162-20A2EC24E8DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC3B1750-17AD-4386-B6EE-1AFC9CDFB6C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E0C1873-22A6-4CE9-853D-2A40BD3D9E62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F6DF608-0DA2-455F-AD28-7BE4A7548E48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BCC306D-EB5D-4784-B0B1-B4F9370796F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*\", \"matchCriteriaId\": \"5639A5F3-CD18-451C-BA5A-3336C42BED83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B0A10CA-F59E-48AC-97E9-8476F63BAEDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B7917C-5934-4AFF-B3DB-BE9B099B27FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"16731B53-3CD1-4B98-947B-7621162D8DB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD738402-A50E-4AEB-8F42-607F52DE5540\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"199AC10C-6E65-409B-8658-E26240B27E1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B378BEF-B070-4955-A6B3-8F2ACBA96832\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"19EC9A36-5EDC-4519-802E-BEA69B18800A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C281EA7-8AE1-4D5A-B03B-B3BE37740195\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"024CF5B1-1875-4785-ACAF-35ECCC7914A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F446903-51AC-4FA3-BA90-C2EA59BBDB01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FE86CC5-956E-4F16-BE7B-2B1CAAEB5C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0AC1B21-D3BE-4B6A-AE40-8B395E81DD50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E5E8A73-1C02-4900-BC30-83084DC8371C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A92A41E3-BF0F-49BD-9F0F-5FDC11BF2499\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"937C3149-3F34-40D8-964D-FB65EBDF0BC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90CD183A-3777-44F9-8CA6-8E802058D099\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68C0CC63-558B-4750-8293-926BE9EAD42C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA66BCA5-3934-449E-BAD3-D0DFBF4A04BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5030281C-CD4F-4106-A100-332A4C3C2AEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D408134A-29E8-4D6A-9352-DB7F9CF55FA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B08C41E-2357-44D5-A3A7-75389B343B8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9F40588-308A-4BA7-AE62-5DCC7D7528EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E41BD65A-F39B-42C5-8776-CE09345A531D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBAFBC02-38E9-41F3-8944-6F6AB0A85941\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9069C99D-C935-4272-B7F4-172CFD246835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41BE2EAA-CC60-4EFA-9E75-61EDA0EB69B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71CABDC4-0E47-4E33-9075-79E0D59D9A92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74A5893C-A855-4C49-A17A-83B6172C0496\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4048A2C7-9646-42E3-9D4B-DE9CF4AC66C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C915139-9B3A-4583-99A9-3447ACEF9E95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01BE6A75-15F2-416C-9EBB-6FDD995C7399\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0D82630-555A-43CE-986D-2D15DD8A68F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB9F1B32-B3C0-47AB-96C1-0AEF7A96744A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A23E72D9-9301-4CF8-A083-0AEC91F2845E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"983636D8-084A-40AA-8EEA-39D4D39EA056\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FEAA6C1-D2F5-4C7A-AEEA-FEDD52F039B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCAC8831-637A-49B7-9DFD-93965D0944A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"247FF6EA-E8E8-4AC9-BC03-6D8929DC60EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73AAA716-1DB3-4D38-A52B-F579EE5627AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18257E82-134E-4B4B-9AA4-997582A6FE05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42224177-DEFC-4A23-9707-0C2A96902FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C0017C6-C985-4F0C-89C4-198063DAB3FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA2A100A-4579-4E32-9ED1-54E6063032CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B41BB85-CED1-4CED-A56E-A58A22AAE4CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19437699-98F7-40EC-B0F9-502CA8126749\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3697FD64-0D39-45E0-B91E-6190B13CE8AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F860666-578F-4B48-ABCA-1B5F2697DEAB\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"707AD226-1D2E-46B5-9626-FDD99A5F7EEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"C5B9EF92-78B1-44DE-83C5-068199E0EE44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"2C05A815-09CB-4201-8345-89AE530D9925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"492C9CF3-A6D8-4BC2-B9CE-6575BEF6C490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"3C89BFC4-CBFE-40D0-AF4B-D18750F8F83E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"7158E609-D504-4938-9651-2A782D319838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"6CF31BF7-3BD2-4EA1-BEA1-C73E5AAD6779\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"C9EFC7E5-F1D7-4EB3-B185-A7CFDA961261\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"CA34F407-47D1-4F39-B26A-84FCD05EE6ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"0B3D4721-7320-423F-8E76-07E4D2E7F6DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"58C0D287-58A4-4C8D-9042-29042FA412F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"DE51E707-6ABD-431C-B3B7-89D514BFFC84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"DDC0B3F6-DF07-4E0A-8F37-3261AD144E6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"599655AB-52D9-47E8-B388-CFB4F75DB8D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"A7450146-5D5D-4681-99F1-2952AB0855B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"43E0AAD2-2937-4389-BF5E-A63A33723F1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"82843F45-7863-4D43-AAC6-E807356D16A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"754DAD0C-555C-41E8-8384-CD5A21442992\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.11:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"77BC1FBB-7D2A-4651-B9AA-E34DBBAA8B59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.12:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"081EC9A4-A303-41B7-85AD-2B63D19F6D3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.13:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"EC29EF2B-3E16-4808-89FA-DE57DBCEAEBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"4437675C-D86D-4903-9641-3AA3D28BD9F2\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the \\\"a\\\" tag.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de XSS en el manejador Ajax en Drupal 7.x en versiones anteriores a la 7.39 y el m\\u00f3dulo Ctools 6.x-1.x en versiones anteriores a 6.x-1.14 para Drupal, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\\u00e9s de vectores implicando un elemento HTML en la lista blanca, posiblemente relacionado con la etiqueta \u0027a\u0027.\"}]", "id": "CVE-2015-6665", "lastModified": "2024-11-21T02:35:23.840", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2015-08-24T14:59:22.680", "references": "[{\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2015/dsa-3346\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/76431\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id/1033358\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.drupal.org/SA-CORE-2015-003\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.drupal.org/node/2554133\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://www.drupal.org/node/2554145\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2015/dsa-3346\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/76431\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1033358\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.drupal.org/SA-CORE-2015-003\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.drupal.org/node/2554133\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://www.drupal.org/node/2554145\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2015-6665\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-24T14:59:22.680\",\"lastModified\":\"2024-11-21T02:35:23.840\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the \\\"a\\\" tag.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en el manejador Ajax en Drupal 7.x en versiones anteriores a la 7.39 y el m\u00f3dulo Ctools 6.x-1.x en versiones anteriores a 6.x-1.14 para Drupal, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores implicando un elemento HTML en la lista blanca, posiblemente relacionado con la etiqueta \u0027a\u0027.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDB5A0-0839-4A20-A003-B8CD56F48171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253C303A-E577-4488-93E6-68A8DD942C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79AB8DD-C907-4038-A931-1A5A4CFB6A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48C33CAB-4633-418C-B162-20A2EC24E8DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3B1750-17AD-4386-B6EE-1AFC9CDFB6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E0C1873-22A6-4CE9-853D-2A40BD3D9E62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6DF608-0DA2-455F-AD28-7BE4A7548E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCC306D-EB5D-4784-B0B1-B4F9370796F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5639A5F3-CD18-451C-BA5A-3336C42BED83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0A10CA-F59E-48AC-97E9-8476F63BAEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B7917C-5934-4AFF-B3DB-BE9B099B27FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"16731B53-3CD1-4B98-947B-7621162D8DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD738402-A50E-4AEB-8F42-607F52DE5540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"199AC10C-6E65-409B-8658-E26240B27E1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B378BEF-B070-4955-A6B3-8F2ACBA96832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"19EC9A36-5EDC-4519-802E-BEA69B18800A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C281EA7-8AE1-4D5A-B03B-B3BE37740195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"024CF5B1-1875-4785-ACAF-35ECCC7914A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F446903-51AC-4FA3-BA90-C2EA59BBDB01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE86CC5-956E-4F16-BE7B-2B1CAAEB5C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0AC1B21-D3BE-4B6A-AE40-8B395E81DD50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E5E8A73-1C02-4900-BC30-83084DC8371C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92A41E3-BF0F-49BD-9F0F-5FDC11BF2499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937C3149-3F34-40D8-964D-FB65EBDF0BC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90CD183A-3777-44F9-8CA6-8E802058D099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C0CC63-558B-4750-8293-926BE9EAD42C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA66BCA5-3934-449E-BAD3-D0DFBF4A04BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5030281C-CD4F-4106-A100-332A4C3C2AEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D408134A-29E8-4D6A-9352-DB7F9CF55FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B08C41E-2357-44D5-A3A7-75389B343B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9F40588-308A-4BA7-AE62-5DCC7D7528EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E41BD65A-F39B-42C5-8776-CE09345A531D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBAFBC02-38E9-41F3-8944-6F6AB0A85941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9069C99D-C935-4272-B7F4-172CFD246835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BE2EAA-CC60-4EFA-9E75-61EDA0EB69B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71CABDC4-0E47-4E33-9075-79E0D59D9A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A5893C-A855-4C49-A17A-83B6172C0496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4048A2C7-9646-42E3-9D4B-DE9CF4AC66C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C915139-9B3A-4583-99A9-3447ACEF9E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE6A75-15F2-416C-9EBB-6FDD995C7399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0D82630-555A-43CE-986D-2D15DD8A68F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9F1B32-B3C0-47AB-96C1-0AEF7A96744A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A23E72D9-9301-4CF8-A083-0AEC91F2845E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983636D8-084A-40AA-8EEA-39D4D39EA056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FEAA6C1-D2F5-4C7A-AEEA-FEDD52F039B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCAC8831-637A-49B7-9DFD-93965D0944A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"247FF6EA-E8E8-4AC9-BC03-6D8929DC60EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73AAA716-1DB3-4D38-A52B-F579EE5627AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18257E82-134E-4B4B-9AA4-997582A6FE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42224177-DEFC-4A23-9707-0C2A96902FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0017C6-C985-4F0C-89C4-198063DAB3FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2A100A-4579-4E32-9ED1-54E6063032CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B41BB85-CED1-4CED-A56E-A58A22AAE4CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19437699-98F7-40EC-B0F9-502CA8126749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3697FD64-0D39-45E0-B91E-6190B13CE8AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F860666-578F-4B48-ABCA-1B5F2697DEAB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"707AD226-1D2E-46B5-9626-FDD99A5F7EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C5B9EF92-78B1-44DE-83C5-068199E0EE44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"2C05A815-09CB-4201-8345-89AE530D9925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"492C9CF3-A6D8-4BC2-B9CE-6575BEF6C490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"3C89BFC4-CBFE-40D0-AF4B-D18750F8F83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"7158E609-D504-4938-9651-2A782D319838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"6CF31BF7-3BD2-4EA1-BEA1-C73E5AAD6779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C9EFC7E5-F1D7-4EB3-B185-A7CFDA961261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"CA34F407-47D1-4F39-B26A-84FCD05EE6ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"0B3D4721-7320-423F-8E76-07E4D2E7F6DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"58C0D287-58A4-4C8D-9042-29042FA412F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DE51E707-6ABD-431C-B3B7-89D514BFFC84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DDC0B3F6-DF07-4E0A-8F37-3261AD144E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"599655AB-52D9-47E8-B388-CFB4F75DB8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"A7450146-5D5D-4681-99F1-2952AB0855B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"43E0AAD2-2937-4389-BF5E-A63A33723F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"82843F45-7863-4D43-AAC6-E807356D16A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"754DAD0C-555C-41E8-8384-CD5A21442992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.11:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"77BC1FBB-7D2A-4651-B9AA-E34DBBAA8B59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.12:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"081EC9A4-A303-41B7-85AD-2B63D19F6D3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.13:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"EC29EF2B-3E16-4808-89FA-DE57DBCEAEBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"4437675C-D86D-4903-9641-3AA3D28BD9F2\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3346\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/76431\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1033358\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.drupal.org/SA-CORE-2015-003\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.drupal.org/node/2554133\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.drupal.org/node/2554145\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3346\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/76431\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1033358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.drupal.org/SA-CORE-2015-003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.drupal.org/node/2554133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.drupal.org/node/2554145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.