Page 5 of 34 results (0.029 seconds)

CVSS: 5.0EPSS: 9%CPEs: 12EXPL: 0

The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION. Los módulos para Drupal (1) Textimage 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1 y (2) Captcha 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1, permiten a atacantes remotos evitar la comprobación CAPTCHA mediante un elemento vacío captcha in $_SESSION. • http://cvs.drupal.org/viewcvs/drupal/contributions/modules/captcha/captcha.module?r1=1.25.2.1&r2=1.25.2.2 http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1 http://drupal.org/node/114364 http://drupal.org/node/114519 http://osvdb.org/32137 http://osvdb.org/32138 http://secunia.com/advisories/23983 http://secunia.com/advisories/23985 http://www.securityfocus.com/bid/22329 http://www.vupen.com/english/advisor •

CVSS: 6.5EPSS: 3%CPEs: 2EXPL: 0

The comment_form_add_preview function in comment.module in Drupal before 4.7.6, and 5.x before 5.1, and vbDrupal, allows remote attackers with "post comments" privileges and access to multiple input filters to execute arbitrary code by previewing comments, which are not processed by "normal form validation routines." La función comment_form_add_preview en comment.module en Drupal anterior a versión 4.7.6, y versión 5.x anterior a 5.1, y vbDrupal, permite a los atacantes remotos con privilegios de "post comments" y acceso a múltiples filtros de entrada para ejecutar código arbitrario mediante la previsualización de comentarios, que no son procesados por "normal form validation routines". • http://archives.neohapsis.com/archives/bugtraq/2007-01/0670.html http://drupal.org/node/113935 http://osvdb.org/32136 http://secunia.com/advisories/23960 http://secunia.com/advisories/23990 http://www.securityfocus.com/bid/22306 http://www.vbdrupal.org/forum/showthread.php?t=786 http://www.vupen.com/english/advisories/2007/0406 http://www.vupen.com/english/advisories/2007/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/31940 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Drupal before 4.6.11, and 4.7 before 4.7.5, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in the (1) filter and (2) system modules. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Drupal anterior 4.6.11, y 4.7 anterior 4.7.5, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de parámetros no especificados en los módulos (1) filter y (2) system. NOTA: algunos de estos detalles se obutvieron de información de terceros. • http://drupal.org/files/sa-2007-001/advisory.txt http://drupal.org/node/104233 http://marc.info/?l=full-disclosure&m=116799778408115&w=2 http://osvdb.org/32139 http://osvdb.org/32140 http://www.securityfocus.com/archive/1/456054/100/100/threaded http://www.vupen.com/english/advisories/2007/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/31311 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.5EPSS: 1%CPEs: 18EXPL: 1

Unspecified vulnerability in Drupal before 4.6.11, and 4.7 before 4.7.5, when MySQL is used, allows remote authenticated users to cause a denial of service by poisoning the page cache via unspecified vectors, which triggers erroneous 404 HTTP errors for pages that exist. Vulnerabilidad no especificada en Drupal anterior a 4.6.11, y 4.7 anterior a 4.7.5, cuando se utiliza MySQL, permite a usuarios autenticados remotamente provocar una denegación de servicio modificando la caché de la página a través de vectores no especificados, lo cual dispara errores HTTP 404 erróneos para páginas que existen. • http://drupal.org/node/104238 http://osvdb.org/32131 http://secunia.com/advisories/23586 http://securityreason.com/securityalert/2115 http://www.securityfocus.com/archive/1/456056/100/0/threaded http://www.securityfocus.com/bid/21895 http://www.vupen.com/english/advisories/2007/0051 •

CVSS: 2.6EPSS: 1%CPEs: 14EXPL: 0

Drupal 4.6.x before 4.6.10 and 4.7.x before 4.7.4 allows form submissions to be redirected, which allows remote attackers to obtain arbitrary form information via a crafted URL. Drupal 4.6.x anterior a 4.6.10 y 4.7.x anterior a 4.7.4 permite que los envíos de formularios sean redireccionados, lo cual permite a atacantes remotos obtener información de su elección de un formulario mediante una URL artesanal. • http://drupal.org/node/88828 http://secunia.com/advisories/22486 http://securityreason.com/securityalert/1764 http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.025-drupal.html http://www.securityfocus.com/archive/1/449200/100/0/threaded http://www.securityfocus.com/bid/20631 http://www.vupen.com/english/advisories/2006/4120 https://exchange.xforce.ibmcloud.com/vulnerabilities/29682 •