Page 34 of 195 results (0.015 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.2 allow remote attackers to (1) delete comments, (2) delete content revisions, and (3) disable menu items as privileged users, related to improper use of HTTP GET and the Forms API. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) de Drupal 5.x anterior a 5.2 permite a atacantes remotos (1) borrar comentarios, (2) borrar revisiones de contenido, y (3) deshabilitar elementos de menú como usuarios privilegioados, relacionada con el uso inapropiado de HTTP GET y la API Forms. • http://drupal.org/files/sa-2007-017/advisory.txt http://osvdb.org/37898 http://secunia.com/advisories/26224 http://www.securityfocus.com/bid/25099 http://www.vupen.com/english/advisories/2007/2697 https://exchange.xforce.ibmcloud.com/vulnerabilities/35639 •

CVSS: 5.0EPSS: 9%CPEs: 12EXPL: 0

The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION. Los módulos para Drupal (1) Textimage 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1 y (2) Captcha 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1, permiten a atacantes remotos evitar la comprobación CAPTCHA mediante un elemento vacío captcha in $_SESSION. • http://cvs.drupal.org/viewcvs/drupal/contributions/modules/captcha/captcha.module?r1=1.25.2.1&r2=1.25.2.2 http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1 http://drupal.org/node/114364 http://drupal.org/node/114519 http://osvdb.org/32137 http://osvdb.org/32138 http://secunia.com/advisories/23983 http://secunia.com/advisories/23985 http://www.securityfocus.com/bid/22329 http://www.vupen.com/english/advisor •

CVSS: 6.5EPSS: 3%CPEs: 2EXPL: 0

The comment_form_add_preview function in comment.module in Drupal before 4.7.6, and 5.x before 5.1, and vbDrupal, allows remote attackers with "post comments" privileges and access to multiple input filters to execute arbitrary code by previewing comments, which are not processed by "normal form validation routines." La función comment_form_add_preview en comment.module en Drupal anterior a versión 4.7.6, y versión 5.x anterior a 5.1, y vbDrupal, permite a los atacantes remotos con privilegios de "post comments" y acceso a múltiples filtros de entrada para ejecutar código arbitrario mediante la previsualización de comentarios, que no son procesados por "normal form validation routines". • http://archives.neohapsis.com/archives/bugtraq/2007-01/0670.html http://drupal.org/node/113935 http://osvdb.org/32136 http://secunia.com/advisories/23960 http://secunia.com/advisories/23990 http://www.securityfocus.com/bid/22306 http://www.vbdrupal.org/forum/showthread.php?t=786 http://www.vupen.com/english/advisories/2007/0406 http://www.vupen.com/english/advisories/2007/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/31940 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Drupal before 4.6.11, and 4.7 before 4.7.5, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in the (1) filter and (2) system modules. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Drupal anterior 4.6.11, y 4.7 anterior 4.7.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de parámetros no especificados en los módulos (1) filter y (2) system. NOTA: algunos de estos detalles se obutvieron de información de terceros. • http://drupal.org/files/sa-2007-001/advisory.txt http://drupal.org/node/104233 http://marc.info/?l=full-disclosure&m=116799778408115&w=2 http://osvdb.org/32139 http://osvdb.org/32140 http://www.securityfocus.com/archive/1/456054/100/100/threaded http://www.vupen.com/english/advisories/2007/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/31311 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.5EPSS: 1%CPEs: 18EXPL: 1

Unspecified vulnerability in Drupal before 4.6.11, and 4.7 before 4.7.5, when MySQL is used, allows remote authenticated users to cause a denial of service by poisoning the page cache via unspecified vectors, which triggers erroneous 404 HTTP errors for pages that exist. Vulnerabilidad no especificada en Drupal anterior a 4.6.11, y 4.7 anterior a 4.7.5, cuando se utiliza MySQL, permite a usuarios autenticados remotamente provocar una denegación de servicio modificando la caché de la página a través de vectores no especificados, lo cual dispara errores HTTP 404 erróneos para páginas que existen. • http://drupal.org/node/104238 http://osvdb.org/32131 http://secunia.com/advisories/23586 http://securityreason.com/securityalert/2115 http://www.securityfocus.com/archive/1/456056/100/0/threaded http://www.securityfocus.com/bid/21895 http://www.vupen.com/english/advisories/2007/0051 •