Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-alpha1:*:*:*:*:drupal:*:*", "matchCriteriaId": "A411F435-15AD-401A-B0DB-AD582F182D97", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc1:*:*:*:*:drupal:*:*", "matchCriteriaId": "73BB4DA1-77C8-4FC0-8697-E727664A67ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc2:*:*:*:*:drupal:*:*", "matchCriteriaId": "06C362A5-EA45-4931-86F3-0B2B5D910A22", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc3:*:*:*:*:drupal:*:*", "matchCriteriaId": "ABCE7B38-8C91-4DC9-8153-2073E9453A8B", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc4:*:*:*:*:drupal:*:*", "matchCriteriaId": "05A1848A-02D6-4B99-BE74-03ED549CAEE8", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc5:*:*:*:*:drupal:*:*", "matchCriteriaId": "80FFD7BF-CA45-4C7C-A739-0A273A9C86E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc6:*:*:*:*:drupal:*:*", "matchCriteriaId": "4C7AF4AD-CB15-4FC8-8C1D-B5663EF1C345", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc7:*:*:*:*:drupal:*:*", "matchCriteriaId": "5BA40FAE-0559-4903-83C4-FF6AF39C4A47", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc8:*:*:*:*:drupal:*:*", "matchCriteriaId": "E7B8E878-A867-4927-867A-2EAF226CDC0F", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc9:*:*:*:*:drupal:*:*", "matchCriteriaId": "923D5C4F-B191-4E85-8A84-76E7F3DBEA20", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.0-rc10:*:*:*:*:drupal:*:*", "matchCriteriaId": "8ABA364A-D5FD-45D9-8B75-E404836B6C68", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.1:*:*:*:*:drupal:*:*", "matchCriteriaId": "B08E6E96-B3A4-48F9-A9EF-6F9D23A2967D", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:6.x-1.x-dev:*:*:*:*:drupal:*:*", "matchCriteriaId": "3C1E517D-2C48-448D-BE46-351D4409F959", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0:*:*:*:*:drupal:*:*", "matchCriteriaId": "F9EF4E7D-4FCB-4E79-AEB8-3F90A62CEB56", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-alpha1:*:*:*:*:drupal:*:*", "matchCriteriaId": "527029D7-4619-4F2A-82FB-D111DC224763", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-alpha2:*:*:*:*:drupal:*:*", "matchCriteriaId": "6E585B20-DA11-4BAA-8066-E2B8D68DEEC8", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-alpha3:*:*:*:*:drupal:*:*", "matchCriteriaId": "04A00CB8-34D6-4436-8CAE-BE08270D986F", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-beta1:*:*:*:*:drupal:*:*", "matchCriteriaId": "66E8D97B-253A-40D3-B1B6-5EFC3DD3FCE1", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-beta2:*:*:*:*:drupal:*:*", "matchCriteriaId": "227C9D70-15B7-476E-B950-323B94D0C1F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-beta3:*:*:*:*:drupal:*:*", "matchCriteriaId": "85458EA6-5E7A-4B83-A68C-C1E8BE4F809C", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-rc1:*:*:*:*:drupal:*:*", "matchCriteriaId": "67265A9A-9DE8-4807-9201-C0E461327784", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-rc2:*:*:*:*:drupal:*:*", "matchCriteriaId": "71FE34D5-3F45-41DF-9C7B-BB157BA7C34F", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-rc3:*:*:*:*:drupal:*:*", "matchCriteriaId": "14023C9A-DA8E-486D-AE08-F91E8D62ABD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.0-rc4:*:*:*:*:drupal:*:*", "matchCriteriaId": "2751229C-9220-479A-AF3F-B674CC7EDF10", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.1:*:*:*:*:drupal:*:*", "matchCriteriaId": "368DF23D-B78C-437B-8122-B0B4D2F671D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.2:*:*:*:*:drupal:*:*", "matchCriteriaId": "DFC92D9F-D623-4977-82DD-7BE956974BE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.3:*:*:*:*:drupal:*:*", "matchCriteriaId": "C97A9320-242D-4C09-A587-CDE03C83315F", "vulnerable": true}, {"criteria": "cpe:2.3:a:dlc_solutions:course:7.x-1.x-dev:*:*:*:*:drupal:*:*", "matchCriteriaId": "1047BBD4-01F9-413E-8CD3-B6834E818A1A", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Course module 6.x-1.x before 6.x-1.2 and 7.x-1.x before 7.x-1.4 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title."}, {"lang": "es", "value": "Vulnerabilidad de XSS en el m\u00f3dulo Course 6.x-1.x anterior a 6.x-1.2 y 7.x-1.x anterior a 7.x-1.4 para Drupal permite a usuarios remotos autenticados inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s de un t\u00edtulo de nodo."}], "id": "CVE-2015-3344", "lastModified": "2024-11-21T02:29:12.577", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2015-04-21T16:59:04.403", "references": [{"source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72631"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "https://www.drupal.org/node/2403305"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "https://www.drupal.org/node/2403309"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.drupal.org/node/2403333"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/01/29/6"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72631"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://www.drupal.org/node/2403305"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://www.drupal.org/node/2403309"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.drupal.org/node/2403333"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}