Page 32 of 195 results (0.019 seconds)

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in Drupal 4.7.x and 5.x, when certain .htaccess protections are disabled, allows remote attackers to inject arbitrary web script or HTML via crafted links involving theme .tpl.php files. Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en Drupal 4.7.x y 5.x, cuando ciertas protecciones .htaccess son desactivadas, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de enlaces manipulados afectando a los archivos del tema .tpl.php. • http://drupal.org/node/208565 http://secunia.com/advisories/28422 http://secunia.com/advisories/28486 http://www.securityfocus.com/bid/27238 http://www.vbdrupal.org/forum/showthread.php?p=6878 http://www.vbdrupal.org/forum/showthread.php?t=1349 http://www.vupen.com/english/advisories/2008/0127 http://www.vupen.com/english/advisories/2008/0134 https://exchange.xforce.ibmcloud.com/vulnerabilities/39605 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 43EXPL: 0

Multiple SQL injection vulnerabilities in Drupal and vbDrupal 4.7.x before 4.7.9 and 5.x before 5.4 allow remote attackers to execute arbitrary SQL commands via modules that pass input to the taxonomy_select_nodes function, as demonstrated by the (1) taxonomy_menu, (2) ajaxLoader, and (3) ubrowser contributed modules. Múltiples vulnerabilidades de inyección SQL en Drupal y vbDrupal 4.7.x versiones anteriores a 4.7.9 y 5.x versiones anteriores a 5.4 permiten a atacantes remotos ejecutar comandos SQL de su elección mediante módulos que pasan la entrada a la función taxonomy_select_nodes, como se demuestra con los módulos (1) taxonomy_menu, (2) ajaxLoader, y (3) ubrowser. • http://drupal.org/node/198162 http://secunia.com/advisories/27932 http://secunia.com/advisories/27951 http://secunia.com/advisories/27973 http://sourceforge.net/project/shownotes.php?release_id=559532 http://sourceforge.net/project/shownotes.php?release_id=559538 http://www.securityfocus.com/bid/26735 https://exchange.xforce.ibmcloud.com/vulnerabilities/38884 https://exchange.xforce.ibmcloud.com/vulnerabilities/38886 https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00190.ht • CWE-20: Improper Input Validation CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 3.5EPSS: 0%CPEs: 14EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el módulo Toke versiones anteriores a 4.7.x-1.5, y 5.x versiones anteriores a 5.x-1.9, para Drupal; tal y como se usa en los módulos ASIN Field, e-Commerce, campo Fullname para CCK, Invite, Node Relativity, Pathauto, PayPal Node, y Ubercart; permiten a atacantes remotos autenticados con privilegios de enviar comentarios, inyectar scripts web o HTML de su elección mediante vectores no especificados relativos a (1) comments, (2) vocabulary names, (3) term names, y (4) usernames. • http://drupal.org/node/184336 http://osvdb.org/38073 http://secunia.com/advisories/27291 https://exchange.xforce.ibmcloud.com/vulnerabilities/37275 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 0

The hook_comments API in Drupal 4.7.x before 4.7.8 and 5.x before 5.3 does not pass publication status, which might allow attackers to bypass access restrictions and trigger e-mail with unpublished comments from some modules, as demonstrated by (1) Organic groups and (2) Subscriptions. El API hook_comments en el Drupal 4.7.x anterior al 4.7.8 y el 5.x anterior al 5.3 no pasa el estado de publicación, lo que puede permitir a atacantes evitar las restricciones de acceso y disparar un e-mail con comentarios no publicados de ciertos módulos, como lo demostrado en (1) los grupos Organic y (2) Subscriptions. • http://drupal.org/node/184354 http://secunia.com/advisories/27292 http://secunia.com/advisories/27352 http://www.securityfocus.com/bid/26119 http://www.vupen.com/english/advisories/2007/3546 https://exchange.xforce.ibmcloud.com/vulnerabilities/37296 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 11%CPEs: 2EXPL: 0

install.php in Drupal 5.x before 5.3, when the configured database server is not reachable, allows remote attackers to execute arbitrary code via vectors that cause settings.php to be modified. El install.php del Drupal 5.x anterior al 5.3, cuando el servidor de base de datos configurado no es alcanzable, permite a atacantes remotos ejecutar código de su elección a través de vectores que provocan que el settings.php sea modificado. • http://drupal.org/files/sa-2007-025/SA-2007-025-5.2.patch http://drupal.org/node/184316 http://osvdb.org/39648 http://secunia.com/advisories/27290 http://secunia.com/advisories/27352 http://www.securityfocus.com/bid/26119 https://exchange.xforce.ibmcloud.com/vulnerabilities/37265 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •