Page 5 of 26 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in the webform module in Drupal 4.6 before July 8, 2006 and 4.7 before July 8, 2006 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el módulo webform de Drupal 4.6 anterior al 8 de Julio de 2006 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de vectores no especificados. • http://drupal.org/node/72846 http://secunia.com/advisories/21021 http://www.securityfocus.com/bid/18947 http://www.vupen.com/english/advisories/2006/2764 https://exchange.xforce.ibmcloud.com/vulnerabilities/27685 •

CVSS: 7.5EPSS: 15%CPEs: 11EXPL: 0

Drupal 4.6.x before 4.6.8 and 4.7.x before 4.7.2, when running under certain Apache configurations such as when FileInfo overrides are disabled within .htaccess, allows remote attackers to execute arbitrary code by uploading a file with multiple extensions, a variant of CVE-2006-2743. • http://drupal.org/files/sa-2006-007/advisory.txt http://drupal.org/node/66763 http://secunia.com/advisories/21244 http://securityreason.com/securityalert/1042 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435792/100/0/threaded http://www.securityfocus.com/bid/18245 •

CVSS: 2.6EPSS: 0%CPEs: 11EXPL: 0

Cross-site scripting (XSS) vulnerability in the upload module (upload.module) in Drupal 4.6.x before 4.6.8 and 4.7.x before 4.7.2 allows remote attackers to inject arbitrary web script or HTML via the uploaded filename. • http://drupal.org/files/sa-2006-007/advisory.txt http://drupal.org/node/66763 http://secunia.com/advisories/21244 http://securityreason.com/securityalert/1042 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435792/100/0/threaded http://www.securityfocus.com/bid/18245 •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in the taxonomy module in Drupal 4.6.8 and 4.7.2 allows remote attackers to inject arbitrary web script or HTML via inputs that are not properly validated when the page title is output, possibly involving the $names variable. • http://drupal.org/files/sa-2006-008/4.6.7.patch http://drupal.org/node/66767 http://secunia.com/advisories/20412 http://secunia.com/advisories/21244 http://securityreason.com/securityalert/1041 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435793/100/0/threaded http://www.securityfocus.com/bid/18245 http://www.vupen.com/english/advisories/2006/2112 https://exchange.xforce.ibmcloud.com/vulnerabilities/26893 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

SQL injection vulnerability in Drupal 4.6.x before 4.6.7 and 4.7.0 allows remote attackers to execute arbitrary SQL commands via the (1) count and (2) from variables to (a) database.mysql.inc, (b) database.pgsql.inc, and (c) database.mysqli.inc. • http://drupal.org/node/65357 http://secunia.com/advisories/20140 http://secunia.com/advisories/21244 http://www.debian.org/security/2006/dsa-1125 http://www.securityfocus.com/archive/1/435790/100/0/threaded http://www.securityfocus.com/bid/18245 http://www.vupen.com/english/advisories/2006/1975 https://exchange.xforce.ibmcloud.com/vulnerabilities/26654 •