cve-2015-6665
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the "a" tag.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-14442", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html" }, { "name": "FEDORA-2015-14329", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html" }, { "name": "FEDORA-2015-13915", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html" }, { "name": "1033358", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033358" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.drupal.org/node/2554145" }, { "name": "FEDORA-2015-14443", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html" }, { "name": "FEDORA-2015-13917", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html" }, { "name": "76431", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76431" }, { "name": "DSA-3346", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.drupal.org/SA-CORE-2015-003" }, { "name": "FEDORA-2015-14444", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.drupal.org/node/2554133" }, { "name": "FEDORA-2015-14330", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html" }, { "name": "FEDORA-2015-13916", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html" }, { "name": "FEDORA-2015-14331", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the \"a\" tag." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2015-14442", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html" }, { "name": "FEDORA-2015-14329", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html" }, { "name": "FEDORA-2015-13915", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html" }, { "name": "1033358", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033358" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.drupal.org/node/2554145" }, { "name": "FEDORA-2015-14443", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html" }, { "name": "FEDORA-2015-13917", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html" }, { "name": "76431", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76431" }, { "name": "DSA-3346", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.drupal.org/SA-CORE-2015-003" }, { "name": "FEDORA-2015-14444", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.drupal.org/node/2554133" }, { "name": "FEDORA-2015-14330", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html" }, { "name": "FEDORA-2015-13916", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html" }, { "name": "FEDORA-2015-14331", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6665", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the \"a\" tag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-14442", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html" }, { "name": "FEDORA-2015-14329", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html" }, { "name": "FEDORA-2015-13915", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html" }, { "name": "1033358", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033358" }, { "name": "https://www.drupal.org/node/2554145", "refsource": "MISC", "url": "https://www.drupal.org/node/2554145" }, { "name": "FEDORA-2015-14443", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html" }, { "name": "FEDORA-2015-13917", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html" }, { "name": "76431", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76431" }, { "name": "DSA-3346", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3346" }, { "name": "https://www.drupal.org/SA-CORE-2015-003", "refsource": "CONFIRM", "url": "https://www.drupal.org/SA-CORE-2015-003" }, { "name": "FEDORA-2015-14444", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html" }, { "name": "https://www.drupal.org/node/2554133", "refsource": "CONFIRM", "url": "https://www.drupal.org/node/2554133" }, { "name": "FEDORA-2015-14330", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html" }, { "name": "FEDORA-2015-13916", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html" }, { "name": "FEDORA-2015-14331", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6665", "datePublished": "2015-08-24T14:00:00", "dateReserved": "2015-08-24T00:00:00", "dateUpdated": "2024-08-06T07:29:24.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-6665\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-24T14:59:22.680\",\"lastModified\":\"2016-12-24T02:59:33.730\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal 7.x before 7.39 and the Ctools module 6.x-1.x before 6.x-1.14 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors involving a whitelisted HTML element, possibly related to the \\\"a\\\" tag.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en el manejador Ajax en Drupal 7.x en versiones anteriores a la 7.39 y el m\u00f3dulo Ctools 6.x-1.x en versiones anteriores a 6.x-1.14 para Drupal, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores implicando un elemento HTML en la lista blanca, posiblemente relacionado con la etiqueta \u0027a\u0027.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56BDB5A0-0839-4A20-A003-B8CD56F48171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253C303A-E577-4488-93E6-68A8DD942C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79AB8DD-C907-4038-A931-1A5A4CFB6A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48C33CAB-4633-418C-B162-20A2EC24E8DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3B1750-17AD-4386-B6EE-1AFC9CDFB6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E0C1873-22A6-4CE9-853D-2A40BD3D9E62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6DF608-0DA2-455F-AD28-7BE4A7548E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCC306D-EB5D-4784-B0B1-B4F9370796F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5639A5F3-CD18-451C-BA5A-3336C42BED83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0A10CA-F59E-48AC-97E9-8476F63BAEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B7917C-5934-4AFF-B3DB-BE9B099B27FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"16731B53-3CD1-4B98-947B-7621162D8DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD738402-A50E-4AEB-8F42-607F52DE5540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"199AC10C-6E65-409B-8658-E26240B27E1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B378BEF-B070-4955-A6B3-8F2ACBA96832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"19EC9A36-5EDC-4519-802E-BEA69B18800A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C281EA7-8AE1-4D5A-B03B-B3BE37740195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"024CF5B1-1875-4785-ACAF-35ECCC7914A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F446903-51AC-4FA3-BA90-C2EA59BBDB01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE86CC5-956E-4F16-BE7B-2B1CAAEB5C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0AC1B21-D3BE-4B6A-AE40-8B395E81DD50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E5E8A73-1C02-4900-BC30-83084DC8371C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92A41E3-BF0F-49BD-9F0F-5FDC11BF2499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937C3149-3F34-40D8-964D-FB65EBDF0BC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90CD183A-3777-44F9-8CA6-8E802058D099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C0CC63-558B-4750-8293-926BE9EAD42C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA66BCA5-3934-449E-BAD3-D0DFBF4A04BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5030281C-CD4F-4106-A100-332A4C3C2AEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D408134A-29E8-4D6A-9352-DB7F9CF55FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B08C41E-2357-44D5-A3A7-75389B343B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9F40588-308A-4BA7-AE62-5DCC7D7528EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E41BD65A-F39B-42C5-8776-CE09345A531D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBAFBC02-38E9-41F3-8944-6F6AB0A85941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9069C99D-C935-4272-B7F4-172CFD246835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BE2EAA-CC60-4EFA-9E75-61EDA0EB69B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71CABDC4-0E47-4E33-9075-79E0D59D9A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A5893C-A855-4C49-A17A-83B6172C0496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4048A2C7-9646-42E3-9D4B-DE9CF4AC66C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C915139-9B3A-4583-99A9-3447ACEF9E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE6A75-15F2-416C-9EBB-6FDD995C7399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0D82630-555A-43CE-986D-2D15DD8A68F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9F1B32-B3C0-47AB-96C1-0AEF7A96744A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A23E72D9-9301-4CF8-A083-0AEC91F2845E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983636D8-084A-40AA-8EEA-39D4D39EA056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FEAA6C1-D2F5-4C7A-AEEA-FEDD52F039B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCAC8831-637A-49B7-9DFD-93965D0944A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"247FF6EA-E8E8-4AC9-BC03-6D8929DC60EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73AAA716-1DB3-4D38-A52B-F579EE5627AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18257E82-134E-4B4B-9AA4-997582A6FE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42224177-DEFC-4A23-9707-0C2A96902FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0017C6-C985-4F0C-89C4-198063DAB3FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2A100A-4579-4E32-9ED1-54E6063032CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B41BB85-CED1-4CED-A56E-A58A22AAE4CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19437699-98F7-40EC-B0F9-502CA8126749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3697FD64-0D39-45E0-B91E-6190B13CE8AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F860666-578F-4B48-ABCA-1B5F2697DEAB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"707AD226-1D2E-46B5-9626-FDD99A5F7EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C5B9EF92-78B1-44DE-83C5-068199E0EE44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"2C05A815-09CB-4201-8345-89AE530D9925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"492C9CF3-A6D8-4BC2-B9CE-6575BEF6C490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"3C89BFC4-CBFE-40D0-AF4B-D18750F8F83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"7158E609-D504-4938-9651-2A782D319838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"6CF31BF7-3BD2-4EA1-BEA1-C73E5AAD6779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C9EFC7E5-F1D7-4EB3-B185-A7CFDA961261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"CA34F407-47D1-4F39-B26A-84FCD05EE6ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"0B3D4721-7320-423F-8E76-07E4D2E7F6DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"58C0D287-58A4-4C8D-9042-29042FA412F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DE51E707-6ABD-431C-B3B7-89D514BFFC84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DDC0B3F6-DF07-4E0A-8F37-3261AD144E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"599655AB-52D9-47E8-B388-CFB4F75DB8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"A7450146-5D5D-4681-99F1-2952AB0855B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"43E0AAD2-2937-4389-BF5E-A63A33723F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"82843F45-7863-4D43-AAC6-E807356D16A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"754DAD0C-555C-41E8-8384-CD5A21442992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.11:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"77BC1FBB-7D2A-4651-B9AA-E34DBBAA8B59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.12:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"081EC9A4-A303-41B7-85AD-2B63D19F6D3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.13:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"EC29EF2B-3E16-4808-89FA-DE57DBCEAEBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"4437675C-D86D-4903-9641-3AA3D28BD9F2\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165674.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165695.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165724.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3346\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/76431\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1033358\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.drupal.org/SA-CORE-2015-003\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.drupal.org/node/2554133\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://www.drupal.org/node/2554145\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.