Page 11 of 54 results (0.008 seconds)

CVSS: 7.5EPSS: 15%CPEs: 11EXPL: 0

Drupal 4.6.x before 4.6.8 and 4.7.x before 4.7.2, when running under certain Apache configurations such as when FileInfo overrides are disabled within .htaccess, allows remote attackers to execute arbitrary code by uploading a file with multiple extensions, a variant of CVE-2006-2743. • http://drupal.org/files/sa-2006-007/advisory.txt http://drupal.org/node/66763 http://secunia.com/advisories/21244 http://securityreason.com/securityalert/1042 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435792/100/0/threaded http://www.securityfocus.com/bid/18245 •

CVSS: 2.6EPSS: 0%CPEs: 11EXPL: 0

Cross-site scripting (XSS) vulnerability in the upload module (upload.module) in Drupal 4.6.x before 4.6.8 and 4.7.x before 4.7.2 allows remote attackers to inject arbitrary web script or HTML via the uploaded filename. • http://drupal.org/files/sa-2006-007/advisory.txt http://drupal.org/node/66763 http://secunia.com/advisories/21244 http://securityreason.com/securityalert/1042 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435792/100/0/threaded http://www.securityfocus.com/bid/18245 •

CVSS: 5.1EPSS: 3%CPEs: 9EXPL: 1

Drupal 4.6.x before 4.6.7 and 4.7.0, when running on Apache with mod_mime, does not properly handle files with multiple extensions, which allows remote attackers to upload, modify, or execute arbitrary files in the files directory. • https://www.exploit-db.com/exploits/1821 http://drupal.org/node/65409 http://secunia.com/advisories/20140 http://secunia.com/advisories/21244 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435794/100/0/threaded http://www.securityfocus.com/bid/18245 http://www.vupen.com/english/advisories/2006/1975 https://exchange.xforce.ibmcloud.com/vulnerabilities/26655 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

SQL injection vulnerability in Drupal 4.6.x before 4.6.7 and 4.7.0 allows remote attackers to execute arbitrary SQL commands via the (1) count and (2) from variables to (a) database.mysql.inc, (b) database.pgsql.inc, and (c) database.mysqli.inc. • http://drupal.org/node/65357 http://secunia.com/advisories/20140 http://secunia.com/advisories/21244 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435790/100/0/threaded http://www.securityfocus.com/bid/18245 http://www.vupen.com/english/advisories/2006/1975 https://exchange.xforce.ibmcloud.com/vulnerabilities/26654 •