Page 5 of 26 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 10EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Drupal 4.5.0 through 4.5.5 and 4.6.0 through 4.6.3 allow remote attackers to inject arbitrary web script or HTML via various HTML tags and values, such as the (1) legend tag and the value parameter used in (2) label and (3) input tags, possibly due to an incomplete blacklist. • http://drupal.org/files/sa-2005-007/4.6.3.patch http://drupal.org/files/sa-2005-007/advisory.txt http://secunia.com/advisories/17824 http://secunia.com/advisories/18630 http://www.debian.org/security/2006/dsa-958 http://www.securityfocus.com/archive/1/418292/100/0/threaded http://www.securityfocus.com/bid/15677 http://www.vupen.com/english/advisories/2005/2684 •

CVSS: 6.4EPSS: 0%CPEs: 10EXPL: 0

Drupal 4.5.0 through 4.5.5 and 4.6.0 through 4.6.3, when running on PHP5, does not correctly enforce user privileges, which allows remote attackers to bypass the "access user profiles" permission. • http://drupal.org/files/sa-2005-009/4.6.3.patch http://drupal.org/files/sa-2005-009/advisory.txt http://secunia.com/advisories/17824 http://secunia.com/advisories/18630 http://www.debian.org/security/2006/dsa-958 http://www.securityfocus.com/archive/1/418336/100/0/threaded http://www.securityfocus.com/bid/15674 http://www.vupen.com/english/advisories/2005/2684 •

CVSS: 4.0EPSS: 0%CPEs: 10EXPL: 0

Interpretation conflict in file.inc in Drupal 4.5.0 through 4.5.5 and 4.6.0 through 4.6.3 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF or JPEG file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in Drupal. • http://drupal.org/files/sa-2005-008/4.6.3.patch http://drupal.org/files/sa-2005-008/advisory.txt http://secunia.com/advisories/17824 http://secunia.com/advisories/18630 http://securityreason.com/securityalert/220 http://www.debian.org/security/2006/dsa-958 http://www.securityfocus.com/archive/1/418291/100/0/threaded http://www.securityfocus.com/bid/15663 http://www.vupen.com/english/advisories/2005/2684 •

CVSS: 5.0EPSS: 3%CPEs: 6EXPL: 1

Unknown vulnerability in Drupal 4.5.0 through 4.5.3, 4.6.0, and 4.6.1 allows remote attackers to execute arbitrary PHP code via a public comment or posting. • https://www.exploit-db.com/exploits/1088 http://marc.info/?l=bugtraq&m=112015287827452&w=2 http://secunia.com/advisories/15872 http://www.debian.org/security/2005/dsa-745 http://www.drupal.org/security/drupal-sa-2005-002/advisory.txt http://www.securityfocus.com/bid/14110 •

CVSS: 7.5EPSS: 95%CPEs: 6EXPL: 6

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. • https://www.exploit-db.com/exploits/43829 https://www.exploit-db.com/exploits/16882 https://www.exploit-db.com/exploits/1078 https://www.exploit-db.com/exploits/1083 https://www.exploit-db.com/exploits/1084 http://marc.info/?l=bugtraq&m=112008638320145&w=2 http://marc.info/?l=bugtraq&m=112015336720867&w=2 http://marc.info/?l=bugtraq&m=112605112027335&w=2 http://pear.php.net/package/XML_RPC/download/1.3.1 http://secunia.com/advisories/15810 http: • CWE-94: Improper Control of Generation of Code ('Code Injection') •