Page 10 of 53 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 52EXPL: 0

Drupal 8.x before 8.1.10 does not properly check for "Administer comments" permission, which allows remote authenticated users to set the visibility of comments for arbitrary nodes by leveraging rights to edit those nodes. Drupal 8.x en versiones anteriores a 8.1.10 no valida adecuadamente el permiso para "Administrar comentarios", lo que permite a usuarios remotos autenticados configurar la visibilidad de los comentarios para nodos arbitrarios aprovechando los derechos para editar estos nodos. • http://www.securityfocus.com/bid/93101 http://www.securitytracker.com/id/1036886 https://www.drupal.org/SA-CORE-2016-004 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 52EXPL: 0

The system.temporary route in Drupal 8.x before 8.1.10 does not properly check for "Export configuration" permission, which allows remote authenticated users to bypass intended access restrictions and read a full config export via unspecified vectors. La ruta system.temporary en Drupal 8.x en versiones anteriores a 8.1.10 no valida adecuadamente el permiso para "Exportar configuración", lo que permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso y leer una exportación de configuración completa a través de vectores no especificados. • http://www.securityfocus.com/bid/93101 http://www.securitytracker.com/id/1036886 https://www.drupal.org/SA-CORE-2016-004 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 0%CPEs: 52EXPL: 0

Cross-site scripting (XSS) vulnerability in Drupal 8.x before 8.1.10 allows remote attackers to inject arbitrary web script or HTML via vectors involving an HTTP exception. Vulnerabilidad de XSS en Drupal 8.x en versiones anteriores a 8.1.10 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores que involucran una excepción HTTP. • http://www.securityfocus.com/bid/93101 http://www.securitytracker.com/id/1036886 https://www.drupal.org/SA-CORE-2016-004 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 105EXPL: 0

The Views module 7.x-3.x before 7.x-3.14 in Drupal 7.x and the Views module in Drupal 8.x before 8.1.3 might allow remote authenticated users to bypass intended access restrictions and obtain sensitive Statistics information via unspecified vectors. El módulo Views 7.x-3.x en versiones anteriores a 7.x-3.14 en Drupal 7.x y el módulo Views en Drupal 8.x en versiones anteriores a 8.1.3 podrían permitir a usuarios remotos autenticados eludir restricciones destinadas al acceso y obtener información de Statistics sensible a través de vectores no especificados. • http://www.openwall.com/lists/oss-security/2016/07/13/4 http://www.openwall.com/lists/oss-security/2016/07/13/7 http://www.securityfocus.com/bid/91230 https://www.drupal.org/SA-CORE-2016-002 https://www.drupal.org/node/2749333 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.1EPSS: 92%CPEs: 21EXPL: 0

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue. PHP hasta la versión 7.0.8 no intenta abordar los conflictos de espacio de nombres de RFC 3875 sección 4.1.18 y por lo tanto no protege aplicaciones de la presencia de datos de clientes no confiables en ambiente variable de HTTP_PROXY, lo que ppodría permitir a atacantes remotos redireccionar el tráfico HTTP saliente de una aplicación a un servidor proxy arbitrario través de una cabecera Proxy manipulada en una petición HTTP, según lo demostrado por (1) una aplicación que hace una llamada getenv('HTTP_PROXY') o (2) una configuración CGI de PHP, también conocido como problema "httpoxy". It was discovered that PHP did not properly protect against the HTTP_PROXY variable name clash. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a PHP script to an attacker-controlled proxy via a malicious HTTP request. • http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html http://rhn.redhat.com/errata/RHSA-2016-1609.html http://rhn.redhat.com/errata/RHSA-2016-1610.html http://rhn.redhat.com/errata/RHSA-2016-1611.html http://rhn.redhat.com/errata/RHSA-2016-1612.html http://rhn.redhat.com/errata/RHSA-2016-1613.html http://www.debian.org/security/2016/dsa-3631 http://www.kb.cert.org/vuls/id/797896 http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html • CWE-20: Improper Input Validation CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •