Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "0EFCA9EB-0A08-4FC2-BF40-DA3BD154DEAE", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F8244420-574B-48C0-A714-F122A0788170", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "EDF8C976-F554-4F60-90D0-E5FF38CC0BCD", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "0C48EF4F-7ED8-4962-B0F6-16B14A707EDE", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "AC1A56B2-5238-428F-93DE-263335E6BE6C", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA275911-894A-4CFD-8ED4-40FC30F46408", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "4D246ABB-C6FD-4EA0-9977-D8B0F0D2564E", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.11:beta1:*:*:*:*:*:*", "matchCriteriaId": "3809C903-AA1F-4BC2-A1FF-65937F16153A", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "F4379147-EE72-4676-BA72-57B82679DB06", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.13:*:*:*:*:*:*:*", "matchCriteriaId": "3DFCF73D-6AE2-47C3-B8CB-24C05F7FA2FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.14:*:*:*:*:*:*:*", "matchCriteriaId": "60344875-5677-4B32-A014-DE81D0B293BD", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.15:*:*:*:*:*:*:*", "matchCriteriaId": "597EF53A-CCC7-4514-84BF-88F37D469A50", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.16:*:*:*:*:*:*:*", "matchCriteriaId": "F6BC4957-D19F-4835-8DC1-6F8979CFA736", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.17:*:*:*:*:*:*:*", "matchCriteriaId": "0A819B30-3322-4977-B5A2-944C1264D9D2", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:6.x-1.18:*:*:*:*:*:*:*", "matchCriteriaId": "E077002D-7B82-4D9F-B168-753B55C37B17", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB340CE8-813C-4C56-A6A9-C141C25A342F", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "A4A5A8C6-05B8-48BE-8D39-9FC020F25C76", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "2EF204D4-01D7-4BAD-9F9E-02B46EC83677", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F426F2DF-B3F3-46BD-BD8C-476C92E9FC55", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "831F6893-FB49-4D61-8991-C4BA43A851F0", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F3C9EB4-3BBE-48B4-BEC0-15FD8ADBBE2A", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A7DFC10-641B-4AC2-B07A-92D47BBF0D4C", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-1.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "32D05D66-A4D1-417F-89CF-474B3251281A", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "1285F499-7C26-4BA4-9FD2-7F03B84D4A99", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "2ADF0914-D471-4335-9FC5-58B62FDA5AED", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:print:7.x-2.x-dev:*:*:*:*:*:*:*", "matchCriteriaId": "98A5AA7F-AF17-438F-B280-F8C5CFCF5729", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes."}, {"lang": "es", "value": "Vulnerabilidad de XSS en el m\u00f3dulo Print (tambi\u00e9n conocido como las versiones Printer, e-mail y PDF) 6.x-1.x anterior a 6.x-1.19, 7.x-1.x anterior a 7.x-1.3, y 7.x-2.x anterior a 7.x-2.0 para Drupal permite a usuarios remotos autenticados con ciertos permisos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores relacionados con nodos."}], "id": "CVE-2014-8078", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2014-10-09T14:55:06.297", "references": [{"source": "cve@mitre.org", "url": "http://secunia.com/advisories/57402"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://drupal.org/node/2231671"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "https://www.drupal.org/node/2231191"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "https://www.drupal.org/node/2231197"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "https://www.drupal.org/node/2231199"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57402"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://drupal.org/node/2231671"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92349"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://www.drupal.org/node/2231191"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://www.drupal.org/node/2231197"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://www.drupal.org/node/2231199"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}