mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2012-5553",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the OM Maximenu module 6.x-1.x before 6.x-1.44 and 7.x-1.x before 7.x-1.44 for Drupal allow remote authenticated users with the \"administer OM Maximenu\" permission to inject arbitrary web script or HTML via the (1) Menu Title (2) Link Title, (3) Path Query, (4) Anchor, or (5) vocabulary names."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://drupal.org/node/1834048",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://drupal.org/node/1834048"
|
|
},
|
|
{
|
|
"name": "http://drupal.org/node/1834866",
|
|
"refsource": "MISC",
|
|
"url": "http://drupal.org/node/1834866"
|
|
},
|
|
{
|
|
"name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules",
|
|
"refsource": "MLIST",
|
|
"url": "http://www.openwall.com/lists/oss-security/2012/11/20/4"
|
|
},
|
|
{
|
|
"name": "http://www.madirish.net/551",
|
|
"refsource": "MISC",
|
|
"url": "http://www.madirish.net/551"
|
|
},
|
|
{
|
|
"name": "http://drupal.org/node/1834046",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://drupal.org/node/1834046"
|
|
}
|
|
]
|
|
}
|
|
} |