mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
187 lines
5.8 KiB
JSON
187 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2011-1066",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-02-23T01:00:03.020",
|
|
"lastModified": "2024-11-21T01:25:26.697",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the Messaging module 6.x-2.x before 6.x-2.4 and 6.x-4.x before 6.x-4.0-beta8 for Drupal allows remote attackers with administer messaging permissions to inject arbitrary web script or HTML via unspecified vectors."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Messaging para Drupal v6.x-2.x anterior a v6.x-2.4 y v6.x-4.x anterior a v6.x-4.0-beta8 permite a atacantes remotos con permisos de administraci\u00f3n de mensajer\u00eda para inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 2.6,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6E9C719C-D23C-41D2-A986-8F735EB85228"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "777E7EB6-6A37-462B-B3E9-FD5BAA525A41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BDC1F46-6FDC-4220-B455-B8685A478A8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "03E0963B-444C-4E6E-B650-F5D1DD58CC69"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-4.x:beta1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3E95A05F-33AD-41F8-B908-D0146F946504"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-4.x:beta3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD8849E9-768D-4ABE-A071-56A5544ACCEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-4.x:beta4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF9A10FD-9962-4C06-975E-7E6C825D67DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-4.x:beta5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "149F398A-CE7D-4128-B926-80BA1D24E029"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-4.x:beta6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F92D16E8-7C80-421D-96CF-DA2F280B9E39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:reyero:messaging:6.x-4.x:beta7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D82D3906-96EF-4605-816F-3C776585AD70"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://drupal.org/node/1064024",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/70933",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/43385",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/46438",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65449",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://drupal.org/node/1064024",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/70933",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/43385",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/46438",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65449",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |