Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "98E0F326-8C25-448E-B775-51A00E94B70C", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E988B3D0-0E9F-46A3-942F-5B806C19125E", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "545F78EA-A4C8-4A02-9307-A7161341ABB5", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBC17B5C-B516-4C51-9931-9C61DF551F69", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "87F04C8D-46F8-4011-B8CB-7A2739D73826", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F79729F-DC69-4C20-97FC-82CAD7731C5C", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "524A1E8F-F1CB-4028-B664-1E97EA56FDD7", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "278CAAEB-C8CE-4BE7-BA48-C353200CCC43", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "8A41C450-BADF-41A8-97D2-16C0B41E3CB9", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0A2CA121-6280-4E12-B16E-6731487BAA7F", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BDB655C8-862F-4F4A-95D0-3BE285492936", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9E9FDD6C-B044-4411-8167-42B90122BDBE", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "831B3C4D-0A3A-4F6F-BAF9-D132E4984C02", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.13:*:*:*:*:*:*:*", "matchCriteriaId": "6866ED88-6BB7-45FA-B730-03A1AE8BABBC", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.14:*:*:*:*:*:*:*", "matchCriteriaId": "8EB5823E-CC26-4302-A201-BC1C711658B4", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E2EF947A-4B67-45E7-AA83-F92023B69578", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.16:*:*:*:*:*:*:*", "matchCriteriaId": "37BF0DAD-F3A5-497F-BF26-0FDE3FFC8BCA", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.17:*:*:*:*:*:*:*", "matchCriteriaId": "8428F316-C7B6-4DEB-B882-324A4EE4CD7F", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8DDF8E00-8C4F-4B2F-A430-BF7A0BCE0047", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.19:*:*:*:*:*:*:*", "matchCriteriaId": "4568D59B-B63A-4F15-A56C-279EC8363FAF", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.20:*:*:*:*:*:*:*", "matchCriteriaId": "72AAAE92-9C07-4354-A8ED-E90EEFD5116D", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.21:*:*:*:*:*:*:*", "matchCriteriaId": "C6EE90C9-CD90-40F1-B07A-C46EBBD487C6", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.22:*:*:*:*:*:*:*", "matchCriteriaId": "DF52A08E-A1D6-45A8-92F2-91A26C679342", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.23:*:*:*:*:*:*:*", "matchCriteriaId": "74880040-BA9A-4E59-92F4-4B28D373C6BC", "vulnerable": true}, {"criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "542F67D5-230B-425D-9F64-B272CA3F01E0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The recycle bin feature in the Monster Menus module 7.x-1.21 before 7.x-1.24 for Drupal does not properly remove nodes from view, which allows remote attackers to obtain sensitive information via an unspecified URL pattern."}, {"lang": "es", "value": "La funcionalidad recycle bin en el m\u00f3dulo Monster Menus 7.x-1.21 en versiones anteriores a 7.x-1.24 para Drupal no elimina correctamente los nodos de la vista, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de un patr\u00f3n URL no especificado."}], "id": "CVE-2015-8095", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2015-11-09T16:59:12.200", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.drupal.org/node/2608382"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "https://www.drupal.org/node/2608414"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://www.drupal.org/node/2608382"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://www.drupal.org/node/2608414"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}