Page 32 of 194 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 43EXPL: 0

Multiple SQL injection vulnerabilities in Drupal and vbDrupal 4.7.x before 4.7.9 and 5.x before 5.4 allow remote attackers to execute arbitrary SQL commands via modules that pass input to the taxonomy_select_nodes function, as demonstrated by the (1) taxonomy_menu, (2) ajaxLoader, and (3) ubrowser contributed modules. Múltiples vulnerabilidades de inyección SQL en Drupal y vbDrupal 4.7.x versiones anteriores a 4.7.9 y 5.x versiones anteriores a 5.4 permiten a atacantes remotos ejecutar comandos SQL de su elección mediante módulos que pasan la entrada a la función taxonomy_select_nodes, como se demuestra con los módulos (1) taxonomy_menu, (2) ajaxLoader, y (3) ubrowser. • http://drupal.org/node/198162 http://secunia.com/advisories/27932 http://secunia.com/advisories/27951 http://secunia.com/advisories/27973 http://sourceforge.net/project/shownotes.php?release_id=559532 http://sourceforge.net/project/shownotes.php?release_id=559538 http://www.securityfocus.com/bid/26735 https://exchange.xforce.ibmcloud.com/vulnerabilities/38884 https://exchange.xforce.ibmcloud.com/vulnerabilities/38886 https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00190.ht • CWE-20: Improper Input Validation CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 3.5EPSS: 0%CPEs: 14EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el módulo Toke versiones anteriores a 4.7.x-1.5, y 5.x versiones anteriores a 5.x-1.9, para Drupal; tal y como se usa en los módulos ASIN Field, e-Commerce, campo Fullname para CCK, Invite, Node Relativity, Pathauto, PayPal Node, y Ubercart; permiten a atacantes remotos autenticados con privilegios de enviar comentarios, inyectar scripts web o HTML de su elección mediante vectores no especificados relativos a (1) comments, (2) vocabulary names, (3) term names, y (4) usernames. • http://drupal.org/node/184336 http://osvdb.org/38073 http://secunia.com/advisories/27291 https://exchange.xforce.ibmcloud.com/vulnerabilities/37275 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 0

The hook_comments API in Drupal 4.7.x before 4.7.8 and 5.x before 5.3 does not pass publication status, which might allow attackers to bypass access restrictions and trigger e-mail with unpublished comments from some modules, as demonstrated by (1) Organic groups and (2) Subscriptions. El API hook_comments en el Drupal 4.7.x anterior al 4.7.8 y el 5.x anterior al 5.3 no pasa el estado de publicación, lo que puede permitir a atacantes evitar las restricciones de acceso y disparar un e-mail con comentarios no publicados de ciertos módulos, como lo demostrado en (1) los grupos Organic y (2) Subscriptions. • http://drupal.org/node/184354 http://secunia.com/advisories/27292 http://secunia.com/advisories/27352 http://www.securityfocus.com/bid/26119 http://www.vupen.com/english/advisories/2007/3546 https://exchange.xforce.ibmcloud.com/vulnerabilities/37296 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 11%CPEs: 2EXPL: 0

install.php in Drupal 5.x before 5.3, when the configured database server is not reachable, allows remote attackers to execute arbitrary code via vectors that cause settings.php to be modified. El install.php del Drupal 5.x anterior al 5.3, cuando el servidor de base de datos configurado no es alcanzable, permite a atacantes remotos ejecutar código de su elección a través de vectores que provocan que el settings.php sea modificado. • http://drupal.org/files/sa-2007-025/SA-2007-025-5.2.patch http://drupal.org/node/184316 http://osvdb.org/39648 http://secunia.com/advisories/27290 http://secunia.com/advisories/27352 http://www.securityfocus.com/bid/26119 https://exchange.xforce.ibmcloud.com/vulnerabilities/37265 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.1EPSS: 3%CPEs: 2EXPL: 0

CRLF injection vulnerability in the drupal_goto function in includes/common.inc Drupal 4.7.x before 4.7.8 and 5.x before 5.3 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Vulnerabilidad de inyección CRLF (CR (retorno de carro) y LF (salto de línea)) en la función drupal_goto del includes/common.inc Drupal 4.7.x anterior al 4.7.8 y el 5.x anterior al 5.3 permite a atacantes remotos la inyección de cabeceras HTTP de su elección y llevar a cabo ataques de división de respuesta HTTP a través de vectores sin especificar. • http://drupal.org/node/184315 http://secunia.com/advisories/27292 http://secunia.com/advisories/27352 http://www.securityfocus.com/bid/26119 http://www.vupen.com/english/advisories/2007/3546 https://exchange.xforce.ibmcloud.com/vulnerabilities/37264 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.html • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') •