ID FEDORA:1E34320596 Type fedora Reporter Fedora Modified 2012-12-13T05:57:46
Description
This suite is primarily a set of APIs and tools to improve the developer experience. It also contains a module called the Page Manager whose job is to manage pa ges. In particular it manages panel pages, but as it grows it will be able to manage far more than just Panels. For the moment, it includes the following tools: Plug-ins -- tools to make it easy for modules to let other modules implement plug-ins from .inc files. Ex-portables -- tools to make it easier for modules to have objects that live in database or live in code, such as 'default views'. AJAX responder -- tools to make it easier for the server to handle AJAX req uests and tell the client what to do with them. Form tools -- tools to make it easier for forms to deal with AJAX. Object caching -- tool to make it easier to edit an object across multiple page requests and cache the editing work. Contexts -- the notion of wrapping objects in a unified wrapper and providing an API to create and accept these contexts as input. Modal dialog -- tool to make it simple to put a form in a modal dialog. Dependent -- a simple form widget to make form items appear and disappear based upon the selections in another item. Content -- plug-gable content types used as panes in Panels and other modules like Dashboard. Form wizard -- an API to make multiple-step forms much easier. CSS tools -- tools to cache and sanitize CSS easily to make user-input CSS safe.
{"id": "FEDORA:1E34320596", "type": "fedora", "bulletinFamily": "unix", "title": "[SECURITY] Fedora 17 Update: drupal6-ctools-1.10-1.fc17", "description": "This suite is primarily a set of APIs and tools to improve the developer experience. It also contains a module called the Page Manager whose job is to manage pa ges. In particular it manages panel pages, but as it grows it will be able to manage far more than just Panels. For the moment, it includes the following tools: Plug-ins -- tools to make it easy for modules to let other modules implement plug-ins from .inc files. Ex-portables -- tools to make it easier for modules to have objects that live in database or live in code, such as 'default views'. AJAX responder -- tools to make it easier for the server to handle AJAX req uests and tell the client what to do with them. Form tools -- tools to make it easier for forms to deal with AJAX. Object caching -- tool to make it easier to edit an object across multiple page requests and cache the editing work. Contexts -- the notion of wrapping objects in a unified wrapper and providing an API to create and accept these contexts as input. Modal dialog -- tool to make it simple to put a form in a modal dialog. Dependent -- a simple form widget to make form items appear and disappear based upon the selections in another item. Content -- plug-gable content types used as panes in Panels and other modules like Dashboard. Form wizard -- an API to make multiple-step forms much easier. CSS tools -- tools to cache and sanitize CSS easily to make user-input CSS safe. ", "published": "2012-12-13T05:57:46", "modified": "2012-12-13T05:57:46", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}, "href": "", "reporter": "Fedora", "references": [], "cvelist": ["CVE-2012-5559"], "lastseen": "2020-12-21T08:17:51", "viewCount": 1, "enchantments": {"dependencies": {}, "score": {"value": 5.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2012-5559"]}, {"type": "fedora", "idList": ["FEDORA:D550D20E4B"]}, {"type": "nessus", "idList": ["FEDORA_2012-19449.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:864939"]}]}, "exploitation": null, "vulnersScore": 5.2}, "affectedPackage": [{"OS": "Fedora", "OSVersion": "17", "arch": "any", "packageName": "drupal6-ctools", "packageVersion": "1.10", "packageFilename": "UNKNOWN", "operator": "lt"}], "immutableFields": [], "cvss2": {"cvssV2": {"accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true}, "cvss3": {}, "edition": 2, "scheme": null, "_state": {"dependencies": 1645343158}}
{"fedora": [{"lastseen": "2020-12-21T08:17:51", "description": "This suite is primarily a set of APIs and tools to improve the developer experience. It also contains a module called the Page Manager whose job is to manage pa ges. In particular it manages panel pages, but as it grows it will be able to manage far more than just Panels. For the moment, it includes the following tools: Plug-ins -- tools to make it easy for modules to let other modules implement plug-ins from .inc files. Ex-portables -- tools to make it easier for modules to have objects that live in database or live in code, such as 'default views'. AJAX responder -- tools to make it easier for the server to handle AJAX req uests and tell the client what to do with them. Form tools -- tools to make it easier for forms to deal with AJAX. Object caching -- tool to make it easier to edit an object across multiple page requests and cache the editing work. Contexts -- the notion of wrapping objects in a unified wrapper and providing an API to create and accept these contexts as input. Modal dialog -- tool to make it simple to put a form in a modal dialog. Dependent -- a simple form widget to make form items appear and disappear based upon the selections in another item. Content -- plug-gable content types used as panes in Panels and other modules like Dashboard. Form wizard -- an API to make multiple-step forms much easier. CSS tools -- tools to cache and sanitize CSS easily to make user-input CSS safe. ", "edition": 2, "published": "2012-12-13T06:01:59", "type": "fedora", "title": "[SECURITY] Fedora 16 Update: drupal6-ctools-1.10-1.fc16", "bulletinFamily": "unix", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5559"], "modified": "2012-12-13T06:01:59", "id": "FEDORA:D550D20E4B", "href": "", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:51", "description": "This suite is primarily a set of APIs and tools to improve the developer experience. It also contains a module called the Page Manager whose job is to manage pa ges. In particular it manages panel pages, but as it grows it will be able to manage far more than just Panels. For the moment, it includes the following tools: Plug-ins -- tools to make it easy for modules to let other modules implement plug-ins from .inc files. Ex-portables -- tools to make it easier for modules to have objects that live in database or live in code, such as 'default views'. AJAX responder -- tools to make it easier for the server to handle AJAX req uests and tell the client what to do with them. Form tools -- tools to make it easier for forms to deal with AJAX. Object caching -- tool to make it easier to edit an object across multiple page requests and cache the editing work. Contexts -- the notion of wrapping objects in a unified wrapper and providing an API to create and accept these contexts as input. Modal dialog -- tool to make it simple to put a form in a modal dialog. Dependent -- a simple form widget to make form items appear and disappear based upon the selections in another item. Content -- plug-gable content types used as panes in Panels and other modules like Dashboard. Form wizard -- an API to make multiple-step forms much easier. CSS tools -- tools to cache and sanitize CSS easily to make user-input CSS safe. ", "edition": 2, "published": "2013-01-12T00:56:15", "type": "fedora", "title": "[SECURITY] Fedora 18 Update: drupal6-ctools-1.10-1.fc18", "bulletinFamily": "unix", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5559"], "modified": "2013-01-12T00:56:15", "id": "FEDORA:BC676222A2", "href": "", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}], "nessus": [{"lastseen": "2021-08-19T12:56:39", "description": "New security release, http://drupal.org/node/1841030.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-13T00:00:00", "type": "nessus", "title": "Fedora 17 : drupal6-ctools-1.10-1.fc17 (2012-19464)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5559"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:drupal6-ctools", "cpe:/o:fedoraproject:fedora:17"], "id": "FEDORA_2012-19464.NASL", "href": "https://www.tenable.com/plugins/nessus/63250", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-19464.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63250);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5559\");\n script_bugtraq_id(56538);\n script_xref(name:\"FEDORA\", value:\"2012-19464\");\n\n script_name(english:\"Fedora 17 : drupal6-ctools-1.10-1.fc17 (2012-19464)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New security release, http://drupal.org/node/1841030.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://drupal.org/node/1841030.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=881986\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-December/094624.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?550a16cb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal6-ctools package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal6-ctools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:17\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^17([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 17.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC17\", reference:\"drupal6-ctools-1.10-1.fc17\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal6-ctools\");\n}\n", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-08-19T12:56:29", "description": "New security fix, http://drupal.org/node/1841030.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2013-01-14T00:00:00", "type": "nessus", "title": "Fedora 18 : drupal6-ctools-1.10-1.fc18 (2012-19508)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5559"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:drupal6-ctools", "cpe:/o:fedoraproject:fedora:18"], "id": "FEDORA_2012-19508.NASL", "href": "https://www.tenable.com/plugins/nessus/63483", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-19508.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63483);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5559\");\n script_xref(name:\"FEDORA\", value:\"2012-19508\");\n\n script_name(english:\"Fedora 18 : drupal6-ctools-1.10-1.fc18 (2012-19508)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New security fix, http://drupal.org/node/1841030.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://drupal.org/node/1841030.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=881986\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2013-January/096198.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2e6db2c9\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal6-ctools package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal6-ctools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:18\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/01/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^18([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 18.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC18\", reference:\"drupal6-ctools-1.10-1.fc18\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal6-ctools\");\n}\n", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-08-19T12:56:36", "description": "New security release, http://drupal.org/node/1841030.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2012-12-13T00:00:00", "type": "nessus", "title": "Fedora 16 : drupal6-ctools-1.10-1.fc16 (2012-19449)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2012-5559"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:drupal6-ctools", "cpe:/o:fedoraproject:fedora:16"], "id": "FEDORA_2012-19449.NASL", "href": "https://www.tenable.com/plugins/nessus/63249", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2012-19449.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(63249);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2012-5559\");\n script_bugtraq_id(56538);\n script_xref(name:\"FEDORA\", value:\"2012-19449\");\n\n script_name(english:\"Fedora 16 : drupal6-ctools-1.10-1.fc16 (2012-19449)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New security release, http://drupal.org/node/1841030.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://drupal.org/node/1841030.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=881986\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2012-December/094634.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?985965c8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal6-ctools package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal6-ctools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:16\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^16([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 16.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC16\", reference:\"drupal6-ctools-1.10-1.fc16\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal6-ctools\");\n}\n", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:38:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5559"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-12-14T00:00:00", "id": "OPENVAS:1361412562310864941", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864941", "type": "openvas", "title": "Fedora Update for drupal6-ctools FEDORA-2012-19464", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for drupal6-ctools FEDORA-2012-19464\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094624.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864941\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-14 09:50:48 +0530 (Fri, 14 Dec 2012)\");\n script_cve_id(\"CVE-2012-5559\");\n script_tag(name:\"cvss_base\", value:\"2.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2012-19464\");\n script_name(\"Fedora Update for drupal6-ctools FEDORA-2012-19464\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'drupal6-ctools'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC17\");\n script_tag(name:\"affected\", value:\"drupal6-ctools on Fedora 17\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal6-ctools\", rpm:\"drupal6-ctools~1.10~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2018-01-06T13:07:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5559"], "description": "Check for the Version of drupal6-ctools", "modified": "2018-01-04T00:00:00", "published": "2012-12-14T00:00:00", "id": "OPENVAS:864941", "href": "http://plugins.openvas.org/nasl.php?oid=864941", "type": "openvas", "title": "Fedora Update for drupal6-ctools FEDORA-2012-19464", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for drupal6-ctools FEDORA-2012-19464\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"This suite is primarily a set of APIs and tools\n to improve the developer experience.\n It also contains a module called the Page Manager whose job is to manage pages.\n In particular it manages panel pages,\n but as it grows it will be able to manage far more than just Panels.\n\n For the moment, it includes the following tools:\n\n Plug-ins -- tools to make it easy for modules\n to let other modules implement plug-ins from .inc files.\n\n Ex-portables -- tools to make it easier for modules to have objects\n that live in database or live in code, such as 'default views'.\n\n AJAX responder -- tools to make it easier for the server to handle AJAX requests\n and tell the client what to do with them.\n\n Form tools -- tools to make it easier for forms to deal with AJAX.\n\n Object caching -- tool to make it easier to edit an object\n across multiple page requests and cache the editing work.\n\n Modal dialog -- tool to make it simple to put a form in a modal dialog.\n\n Dependent -- a simple form widget to make form items appear\n and disappear based upon the selections in another item.\n\n Content -- plug-gable content types used as panes in Panels\n and other modules like Dashboard.\n\n Form wizard -- an API to make multiple-step forms much easier.\n\n CSS tools -- tools to cache and sanitize CSS easily to make user-input CSS safe.\";\n\ntag_affected = \"drupal6-ctools on Fedora 17\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094624.html\");\n script_id(864941);\n script_version(\"$Revision: 8285 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 07:29:16 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-14 09:50:48 +0530 (Fri, 14 Dec 2012)\");\n script_cve_id(\"CVE-2012-5559\");\n script_tag(name:\"cvss_base\", value:\"2.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2012-19464\");\n script_name(\"Fedora Update for drupal6-ctools FEDORA-2012-19464\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of drupal6-ctools\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC17\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal6-ctools\", rpm:\"drupal6-ctools~1.10~1.fc17\", rls:\"FC17\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-01-11T11:06:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5559"], "description": "Check for the Version of drupal6-ctools", "modified": "2018-01-10T00:00:00", "published": "2012-12-14T00:00:00", "id": "OPENVAS:864939", "href": "http://plugins.openvas.org/nasl.php?oid=864939", "type": "openvas", "title": "Fedora Update for drupal6-ctools FEDORA-2012-19449", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for drupal6-ctools FEDORA-2012-19449\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"This suite is primarily a set of APIs and tools\n to improve the developer experience.\n It also contains a module called the Page Manager whose job is to manage pages.\n In particular it manages panel pages,\n but as it grows it will be able to manage far more than just Panels.\n\n For the moment, it includes the following tools:\n\n Plug-ins -- tools to make it easy for modules\n to let other modules implement plug-ins from .inc files.\n\n Ex-portables -- tools to make it easier for modules to have objects\n that live in database or live in code, such as 'default views'.\n\n AJAX responder -- tools to make it easier for the server to handle AJAX requests\n and tell the client what to do with them.\n\n Form tools -- tools to make it easier for forms to deal with AJAX.\n\n Object caching -- tool to make it easier to edit an object\n across multiple page requests and cache the editing work.\n\n Dependent -- a simple form widget to make form items appear\n and disappear based upon the selections in another item.\n\n Content -- plug-gable content types used as panes in Panels\n and other modules like Dashboard.\n\n Form wizard -- an API to make multiple-step forms much easier.\n\n CSS tools -- tools to cache and sanitize CSS easily to make user-input CSS safe.\";\n\ntag_affected = \"drupal6-ctools on Fedora 16\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094634.html\");\n script_id(864939);\n script_version(\"$Revision: 8352 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-10 08:01:57 +0100 (Wed, 10 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-14 09:50:46 +0530 (Fri, 14 Dec 2012)\");\n script_cve_id(\"CVE-2012-5559\");\n script_tag(name:\"cvss_base\", value:\"2.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n script_xref(name: \"FEDORA\", value: \"2012-19449\");\n script_name(\"Fedora Update for drupal6-ctools FEDORA-2012-19449\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of drupal6-ctools\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal6-ctools\", rpm:\"drupal6-ctools~1.10~1.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2019-05-29T18:38:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2012-5559"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2012-12-14T00:00:00", "id": "OPENVAS:1361412562310864939", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310864939", "type": "openvas", "title": "Fedora Update for drupal6-ctools FEDORA-2012-19449", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for drupal6-ctools FEDORA-2012-19449\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2012-December/094634.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.864939\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-12-14 09:50:46 +0530 (Fri, 14 Dec 2012)\");\n script_cve_id(\"CVE-2012-5559\");\n script_tag(name:\"cvss_base\", value:\"2.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:N/C:N/I:P/A:N\");\n script_xref(name:\"FEDORA\", value:\"2012-19449\");\n script_name(\"Fedora Update for drupal6-ctools FEDORA-2012-19449\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'drupal6-ctools'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC16\");\n script_tag(name:\"affected\", value:\"drupal6-ctools on Fedora 16\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC16\")\n{\n\n if ((res = isrpmvuln(pkg:\"drupal6-ctools\", rpm:\"drupal6-ctools~1.10~1.fc16\", rls:\"FC16\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}}], "cve": [{"lastseen": "2022-03-23T13:17:52", "description": "Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.", "cvss3": {}, "published": "2012-12-03T21:55:00", "type": "cve", "title": "CVE-2012-5559", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-5559"], "modified": "2015-06-19T14:20:00", "cpe": ["cpe:/a:chaos_tool_suite_project:ctools:6.x-1.2", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.1", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.7", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.8", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.6", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.5", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.3", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.x", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.9", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.0", "cpe:/a:chaos_tool_suite_project:ctools:6.x-1.4"], "id": "CVE-2012-5559", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5559", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*", "cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*"]}]}