Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD9A0AD4-D5C3-4FC9-BF6A-9D35BB50669E", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.1:*:*:*:*:*:*:*", "matchCriteriaId": "96F51872-D49F-49A7-A4E9-ACD3C8A346CB", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.2:*:*:*:*:*:*:*", "matchCriteriaId": "33BC6A35-395B-4CF0-B831-A5AA36098865", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D237B9DC-464D-4B0C-B56C-C82D5BADCFAA", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.4:*:*:*:*:*:*:*", "matchCriteriaId": "771D49D3-19C3-40E9-A1B6-2F20298D670E", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9E4C3AE-C3E3-4EE2-9118-F973C3E3B3C2", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.6:*:*:*:*:*:*:*", "matchCriteriaId": "208A48BD-0F86-4C80-A9BC-A4D477242B6F", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.7:*:*:*:*:*:*:*", "matchCriteriaId": "84CA0CA8-7D70-4C03-97F5-E53A3FB9E5AF", "vulnerable": true}, {"criteria": "cpe:2.3:a:m2osw:tableofcontents:6.x-3.x:dev:*:*:*:*:*:*", "matchCriteriaId": "F0E7FA6C-2007-488E-8D88-9EAB3D68C91B", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "The Table of Contents module 6.x-3.x before 6.x-3.8 for Drupal does not properly check node permissions, which allows remote attackers to read a node's headers by accessing a table of contents block."}, {"lang": "es", "value": "El m\u00f3dulo Table of Contents (Tabla de Contenidos) v6.x antes de v6.x-3.8-3.x para Drupal no comprueba correctamente los permisos del nodo, lo que permite a atacantes remotos leer los encabezados de un nodo accediendo a una tabla de bloques de contenido.\r\n"}], "id": "CVE-2012-5584", "lastModified": "2024-11-21T01:44:56.083", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-12-26T17:55:01.940", "references": [{"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://drupal.org/node/1841026"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1841046"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/11/29/2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://drupal.org/node/1841026"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1841046"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/11/29/2"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}