Page 11 of 81 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Drupal 5.x before 5.2, and 4.7.x before 4.7.7, (1) allow remote attackers to inject arbitrary web script or HTML via "some server variables," including PHP_SELF; and (2) allow remote authenticated administrators to inject arbitrary web script or HTML via custom content type names. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Drupal 5.x anterior a 5.2, y 4.7.x anterior a 4.7.7, (1) permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de "algunas variables de servidor", incluyendo PHP_SELF; y (2) permiten a administradores autenticados remotamente inyectar secuencias de comandos web o HTML de su elección a través de nombres de tipo de contenido personalizados. • http://drupal.org/files/sa-2007-018/advisory.txt http://secunia.com/advisories/26224 http://www.securityfocus.com/bid/25097 http://www.vupen.com/english/advisories/2007/2697 https://exchange.xforce.ibmcloud.com/vulnerabilities/35637 https://exchange.xforce.ibmcloud.com/vulnerabilities/35638 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.2 allow remote attackers to (1) delete comments, (2) delete content revisions, and (3) disable menu items as privileged users, related to improper use of HTTP GET and the Forms API. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) de Drupal 5.x anterior a 5.2 permite a atacantes remotos (1) borrar comentarios, (2) borrar revisiones de contenido, y (3) deshabilitar elementos de menú como usuarios privilegioados, relacionada con el uso inapropiado de HTTP GET y la API Forms. • http://drupal.org/files/sa-2007-017/advisory.txt http://osvdb.org/37898 http://secunia.com/advisories/26224 http://www.securityfocus.com/bid/25099 http://www.vupen.com/english/advisories/2007/2697 https://exchange.xforce.ibmcloud.com/vulnerabilities/35639 •

CVSS: 5.0EPSS: 9%CPEs: 12EXPL: 0

The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION. Los módulos para Drupal (1) Textimage 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1 y (2) Captcha 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1, permiten a atacantes remotos evitar la comprobación CAPTCHA mediante un elemento vacío captcha in $_SESSION. • http://cvs.drupal.org/viewcvs/drupal/contributions/modules/captcha/captcha.module?r1=1.25.2.1&r2=1.25.2.2 http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1 http://drupal.org/node/114364 http://drupal.org/node/114519 http://osvdb.org/32137 http://osvdb.org/32138 http://secunia.com/advisories/23983 http://secunia.com/advisories/23985 http://www.securityfocus.com/bid/22329 http://www.vupen.com/english/advisor •

CVSS: 6.5EPSS: 3%CPEs: 2EXPL: 0

The comment_form_add_preview function in comment.module in Drupal before 4.7.6, and 5.x before 5.1, and vbDrupal, allows remote attackers with "post comments" privileges and access to multiple input filters to execute arbitrary code by previewing comments, which are not processed by "normal form validation routines." La función comment_form_add_preview en comment.module en Drupal anterior a versión 4.7.6, y versión 5.x anterior a 5.1, y vbDrupal, permite a los atacantes remotos con privilegios de "post comments" y acceso a múltiples filtros de entrada para ejecutar código arbitrario mediante la previsualización de comentarios, que no son procesados por "normal form validation routines". • http://archives.neohapsis.com/archives/bugtraq/2007-01/0670.html http://drupal.org/node/113935 http://osvdb.org/32136 http://secunia.com/advisories/23960 http://secunia.com/advisories/23990 http://www.securityfocus.com/bid/22306 http://www.vbdrupal.org/forum/showthread.php?t=786 http://www.vupen.com/english/advisories/2007/0406 http://www.vupen.com/english/advisories/2007/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/31940 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Drupal before 4.6.11, and 4.7 before 4.7.5, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in the (1) filter and (2) system modules. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Drupal anterior 4.6.11, y 4.7 anterior 4.7.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de parámetros no especificados en los módulos (1) filter y (2) system. NOTA: algunos de estos detalles se obutvieron de información de terceros. • http://drupal.org/files/sa-2007-001/advisory.txt http://drupal.org/node/104233 http://marc.info/?l=full-disclosure&m=116799778408115&w=2 http://osvdb.org/32139 http://osvdb.org/32140 http://www.securityfocus.com/archive/1/456054/100/100/threaded http://www.vupen.com/english/advisories/2007/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/31311 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •