CVE-2012-1623
Published Oct 6, 2012
Last updated 12 years ago
Overview
- Description
- The Registration Codes module before 6.x-2.4 for Drupal does not restrict access to the registration code list, which might allow remote attackers to bypass intended registration restrictions.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:aidanlister:regcode:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "062CE97B-A447-4E63-9782-BBEACA93D4A6", "versionEndIncluding": "6.x-2.3" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BCF13FF-0886-4AD6-9458-8590C01ED29E" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2ED9CD9-6228-4CC1-9DA0-470A7C69548C" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "723CF8A9-EA44-485E-AABF-2EF836E768F9" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "518D00C7-83AA-47CC-B911-3637399A7724" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AD60C2B-BAAE-4ADD-BD9C-F9D09F3491BB" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9174B34-3857-44B8-A80A-3A497F233E5A" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7B9857E-912F-4DE1-B9F1-9B6776EF90E6" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DE0ED52-58EF-4015-87E3-CE22D30971C6" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06FB3B55-E514-47C2-92F7-87E76691F591" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F727164A-5003-4A2A-86E0-E52DD1DA34BB" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E02E2503-C247-46B1-B0F6-2E1612D41EDD" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "019486AD-9067-4E2E-BE46-63982218EB2D" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.0:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4FE163B-D9B4-400A-B7DD-D4C0F268450D" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32A43363-243F-4320-83B9-E6F20AE9DB33" }, { "criteria": "cpe:2.3:a:aidanlister:regcode:6.x-2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E99E8382-CB07-457D-8453-75FD697A0B8F" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]