CVE-2008-3740
Published Aug 27, 2008
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the output filter in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDBE79A6-5762-4A7C-8FDA-C11FFFDCFC9B" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5BCAB7B-DF79-4DB8-A5C4-731F251A02A2" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5AEAB73-F7A9-4C62-BCB6-1028DAF149DB" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF34F79B-6B1B-45CA-82BA-24D4254B26DF" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C4C5857-3690-4D74-B135-B6AB7E766FB7" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EC12E03-C4B0-4B2F-B70B-0EB19C450AB2" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD50E551-7609-45EF-B2C6-3873D9CF8DB6" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "327712EE-8E9B-4A62-94A8-504C9CD2DE97" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C4FC56B-0289-411C-88BF-144D7338D456" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED3ECEA7-E6D3-43E8-A281-56C7F95A0B7F" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFE07AAD-9207-4C5F-A108-7F7753E4F48C" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52D8F291-CBEB-4EAA-9388-F63066A2DFA0" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0BD5AEC-F20E-4E53-AF3F-2C60BA2D2171" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5D76BC5-0409-4D78-8064-A78B923E9167" } ], "operator": "OR" } ] } ]