CVE-2009-1942
Published Jun 5, 2009
Last updated 15 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the Quiz module 5.x, 6.x-2.x before 6.x-2.2, and 6.x-3.x before 6.x-3.0, a module for Drupal, allows remote authenticated users, with create quizzes or quiz questions access, to inject arbitrary web script or HTML via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:quiz:5.x:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1300BA4-0341-40A2-A580-4CEF4D70E930" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBAB35A7-147B-4EB2-B5E3-C1A1A205CC1D" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C6466C8-070E-403D-A44D-4719BCB66ECF" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D18685B6-CC2B-4B82-8523-787E36D0856F" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D902AFF-0677-4299-9B7E-1082F7ABF979" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A34B6BBC-243C-4BE5-B069-20A2C2F9727C" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38A5A7C7-869B-4FCC-A94E-12B3A09D94CF" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55DDDB0A-D9BE-46E6-A26C-E8F88ACC3692" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-2.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6288701C-B559-4EE4-A5B3-48B779A1BD7C" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70267A32-8329-417A-967E-8844E6CE6942" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-3.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B51E500-6694-42A4-B3B9-FB15562CBA47" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-3.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71A9F973-592A-41D7-AECD-80A633595277" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-3.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "753F8DDB-DF9E-4B4C-9CA1-2A20510D57E7" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-3.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C18710D5-4138-4D97-AD0E-68489E4D305F" }, { "criteria": "cpe:2.3:a:drupal:quiz:6.x-3.x:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E62D2DB-67CE-4747-B81C-DF1B8BC6D201" } ], "operator": "OR" } ] } ]