CVE-2012-2072
 
Severity Score
2.1
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site scripting (XSS) vulnerability in the Share Buttons (AddToAny) module 6.x-3.x before 6.x-3.4 for Drupal allows remote authenticated users with the administer addtoany permission to inject arbitrary web script or HTML via unspecified vectors.
Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en el módulo "Share Buttons" (AddToAny) v6.x-3.x antes de v6.x-3.4 para Drupal permite inyectar secuencias de comandos web o HTML a usuarios remotos autenticados con permiso para administrar AddToAny a través de vectores no especificados.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-04-04 CVE Reserved
- 2012-08-14 CVE Published
- 2023-07-05 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://osvdb.org/80675 | Vdb Entry | |
http://www.openwall.com/lists/oss-security/2012/04/07/1 | Mailing List | |
http://www.securityfocus.com/bid/52777 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74469 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://drupal.org/node/1083664 | 2017-08-29 | |
http://drupal.org/node/1506412 | 2017-08-29 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/48615 | 2017-08-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Patrick Przybilla Search vendor "Patrick Przybilla" | Addtoany Search vendor "Patrick Przybilla" for product "Addtoany" | 6.x-3.0 Search vendor "Patrick Przybilla" for product "Addtoany" and version "6.x-3.0" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | - | - |
Safe
|
Patrick Przybilla Search vendor "Patrick Przybilla" | Addtoany Search vendor "Patrick Przybilla" for product "Addtoany" | 6.x-3.1 Search vendor "Patrick Przybilla" for product "Addtoany" and version "6.x-3.1" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | - | - |
Safe
|
Patrick Przybilla Search vendor "Patrick Przybilla" | Addtoany Search vendor "Patrick Przybilla" for product "Addtoany" | 6.x-3.2 Search vendor "Patrick Przybilla" for product "Addtoany" and version "6.x-3.2" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | - | - |
Safe
|
Patrick Przybilla Search vendor "Patrick Przybilla" | Addtoany Search vendor "Patrick Przybilla" for product "Addtoany" | 6.x-3.3 Search vendor "Patrick Przybilla" for product "Addtoany" and version "6.x-3.3" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | - | - |
Safe
|
Patrick Przybilla Search vendor "Patrick Przybilla" | Addtoany Search vendor "Patrick Przybilla" for product "Addtoany" | 6.x-3.x Search vendor "Patrick Przybilla" for product "Addtoany" and version "6.x-3.x" | dev |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | - | - |
Safe
|