Page 27 of 177 results (0.008 seconds)

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Cross-site scripting (XSS) vulnerability in the Tasklist module 5.x-1.x before 5.x-1.3 and 5.x-2.x before 5.x-2.0-alpha1, a module for Drupal, allows remote authenticated users to inject arbitrary web script or HTML via Cascading Style Sheets (CSS). Vulnerabilidad de tipo cross-site scripting (XSS) en el módulo Tasklist versiones 5.x-1.x anteriores a 5.x-1.3 y versiones 5.x-2.x anteriores a 5.x-2.0-alpha1, un módulo para Drupal, permite a los usuarios autenticados remotos inyectar script web o HTML arbitrario por medio de Hojas de Estilo en Cascada (CSS). • http://drupal.org/node/406316 http://osvdb.org/52782 http://secunia.com/advisories/34376 http://www.securityfocus.com/bid/34170 https://exchange.xforce.ibmcloud.com/vulnerabilities/49319 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in the Answers module 5.x-1.x-dev and possibly other 5.x versions, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via a Simple Answer to a question. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el módulo Answers 5.x-1.x-dev y posiblemente otras versiones 5.x, un módulo para Drupal, permite a atacantes remotos inyectar web script o HTML a través de Simple Answer de una pregunta. • http://drupal.org/node/310223 http://seclists.org/fulldisclosure/2008/Sep/0202.html http://www.securityfocus.com/bid/31146 http://www.vupen.com/english/advisories/2008/2620 https://exchange.xforce.ibmcloud.com/vulnerabilities/45112 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.5EPSS: 0%CPEs: 10EXPL: 2

Cross-site scripting (XSS) vulnerability in the Protected Node module 5.x before 5.x-1.4 and 6.x before 6.x-1.5, a module for Drupal, allows remote authenticated users with "administer site configuration" permissions to inject arbitrary web script or HTML via the Password page info field, which is not properly handled by the protected_node_enterpassword function in protected_node.module. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en el módulo Protected Node v5.x anterior v5.x-1.4 y v6.x anterior a v6.x-1.5 para Drupal, permite a usuarios autenticados remotamente con permisos de "configuración administrativa del sitio", la inyección de secuencias de comandos web o HTML de su elección a través del campo Password Page Info, que no está manejado adecuadamente por la función protected_node_enterpassword en protected_node.module. • http://drupal.org/node/385950 http://drupal.org/node/386604 http://drupal.org/node/386606 http://lampsecurity.org/node/28 http://osvdb.org/52300 http://secunia.com/advisories/34060 http://www.vupen.com/english/advisories/2009/0572 https://exchange.xforce.ibmcloud.com/vulnerabilities/48980 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.0EPSS: 0%CPEs: 34EXPL: 0

SQL injection vulnerability in SpeedTech Organization and Resource Manager (Storm) 5.x before 5.x-1.14 and 6.x before 6.x-1.18, a module for Drupal, allows remote authenticated users with storm project access to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en SpeedTech Organization y Resource Manager (Storm) 5.x anterior a 5.x-1.14 y 6.x anterior a 6.x-1.18, un módulo para Drupal; permite a usuarios autenticados en remoto con acceso al proyecto storm ejecutar comandos SQL de su elección a través de vectores no especificados. • http://drupal.org/node/342246 http://secunia.com/advisories/32978 http://www.securityfocus.com/bid/32626 https://exchange.xforce.ibmcloud.com/vulnerabilities/47077 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.3EPSS: 1%CPEs: 18EXPL: 0

includes/bootstrap.inc in Drupal 5.x before 5.12 and 6.x before 6.6, when the server is configured for "IP-based virtual hosts," allows remote attackers to include and execute arbitrary files via the HTTP Host header. El archivo includes/bootstrap.inc en Drupal versiones 5.x anterior a 5.12 y versiones 6.x anterior a 6.6, cuando el servidor está configurado para "IP-based virtual hosts," permite a los atacantes remotos incluir y ejecutar archivos arbitrarios por medio del encabezado Host de HTTP. • http://drupal.org/files/sa-2008-067/SA-2008-067-5.11.patch http://drupal.org/node/324824 http://secunia.com/advisories/32389 http://secunia.com/advisories/32441 http://www.securityfocus.com/bid/31900 http://www.vupen.com/english/advisories/2008/2913 https://exchange.xforce.ibmcloud.com/vulnerabilities/46049 https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00783.html https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00826.html • CWE-16: Configuration CWE-20: Improper Input Validation •