CVE-2013-4504
Published May 13, 2014
Last updated 11 years ago
Overview
- Description
- The Monster Menus module 7.x-1.x before 7.x-1.15 allows remote attackers to read arbitrary node comments via a crafted URL.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98E0F326-8C25-448E-B775-51A00E94B70C" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E988B3D0-0E9F-46A3-942F-5B806C19125E" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "545F78EA-A4C8-4A02-9307-A7161341ABB5" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBC17B5C-B516-4C51-9931-9C61DF551F69" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87F04C8D-46F8-4011-B8CB-7A2739D73826" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F79729F-DC69-4C20-97FC-82CAD7731C5C" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "524A1E8F-F1CB-4028-B664-1E97EA56FDD7" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "278CAAEB-C8CE-4BE7-BA48-C353200CCC43" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A41C450-BADF-41A8-97D2-16C0B41E3CB9" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A2CA121-6280-4E12-B16E-6731487BAA7F" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDB655C8-862F-4F4A-95D0-3BE285492936" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E9FDD6C-B044-4411-8167-42B90122BDBE" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "831B3C4D-0A3A-4F6F-BAF9-D132E4984C02" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6866ED88-6BB7-45FA-B730-03A1AE8BABBC" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EB5823E-CC26-4302-A201-BC1C711658B4" }, { "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "542F67D5-230B-425D-9F64-B272CA3F01E0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]