Page 5 of 70 results (0.012 seconds)

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

01 Mar 2018 — Drupal core 7.x versions before 7.57 when using Drupal's private file system, Drupal will check to make sure a user has access to a file before allowing the user to view or download it. This check fails under certain conditions in which one module is trying to grant access to the file and another is trying to deny it, leading to an access bypass vulnerability. This vulnerability is mitigated by the fact that it only occurs for unusual site configurations. Las versiones 7.x de Drupal core anteriores a la 7.5... • https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

01 Mar 2018 — A jQuery cross site scripting vulnerability is present when making Ajax requests to untrusted domains. This vulnerability is mitigated by the fact that it requires contributed or custom modules in order to exploit. For Drupal 8, this vulnerability was already fixed in Drupal 8.4.0 in the Drupal core upgrade to jQuery 3. For Drupal 7, it is fixed in the current release (Drupal 7.57) for jQuery 1.4.4 (the version that ships with Drupal 7 core) as well as for other newer versions of jQuery that might be used o... • https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.8EPSS: 0%CPEs: 4EXPL: 0

01 Mar 2018 — Drupal core 7.x versions before 7.57 has an external link injection vulnerability when the language switcher block is used. A similar vulnerability exists in various custom and contributed modules. This vulnerability could allow an attacker to trick users into unwillingly navigating to an external site. Las versiones 7.x de Drupal core anteriores a la 7.57 tienen una vulnerabilidad de inyección de enlaces externos cuando se emplea el bloque de cambio de lenguaje. Existe una vulnerabilidad similar en varios ... • https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.5EPSS: 0%CPEs: 71EXPL: 0

20 Apr 2017 — Drupal 8 before 8.2.8 and 8.3 before 8.3.1 allows critical access bypass by authenticated users if the RESTful Web Services (rest) module is enabled and the site allows PATCH requests. Drupal 8 en versiones anteriores a 8.2.8 y 8.3 en versiones anteriores a 8.3.1 permite elusión de acceso crítica por usuarios autenticados si el módulo RESTful Web Services (resto) está habilitado y el sitio permite solicitudes PATCH. • http://www.securityfocus.com/bid/97941 •

CVSS: 8.1EPSS: 5%CPEs: 60EXPL: 0

16 Mar 2017 — A 3rd party development library including with Drupal 8 development dependencies is vulnerable to remote code execution. This is mitigated by the default .htaccess protection against PHP execution, and the fact that Composer development dependencies aren't normal installed. You might be vulnerable to this if you are running a version of Drupal before 8.2.2. To be sure you aren't vulnerable, you can remove the /vendor/phpunit directory from your production deployments Una libreria de desarrollo de ... • http://www.securityfocus.com/bid/96919 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVSS: 4.3EPSS: 0%CPEs: 117EXPL: 0

25 Nov 2016 — The taxonomy module in Drupal 7.x before 7.52 and 8.x before 8.2.3 might allow remote authenticated users to obtain sensitive information about taxonomy terms by leveraging inconsistent naming of access query tags. El módulo de taxonomía en Drupal 7.x en versiones anteriores a 7.52 y 8.x en versiones anteriores a 8.2.3 podría permitir a usuarios remotos autenticados obtener información sensible sobre términos de taxonomía aprovechando nomenclatura inconsistente de las etiquetas de consulta de acceso. • http://www.debian.org/security/2016/dsa-3718 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 61EXPL: 0

25 Nov 2016 — The user password reset form in Drupal 8.x before 8.2.3 allows remote attackers to conduct cache poisoning attacks by leveraging failure to specify a correct cache context. El formulario de reseteo de contraseña de usuario en Drupal 8.x en versiones anteriores a 8.2.3 permite a atacantes remotos llevar a cabo ataques de envenenamiento de caché aprovechando un error para especificar un contexto de caché correcto. • http://www.securityfocus.com/bid/94367 • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 6.5EPSS: 0%CPEs: 61EXPL: 0

25 Nov 2016 — The transliterate mechanism in Drupal 8.x before 8.2.3 allows remote attackers to cause a denial of service via a crafted URL. El mecanismo de transliteración en Drupal 8.x en versiones anteriores a 8.2.3 permite a atacantes remotos provocar una denegación de servicio a través de una URL manipulada. • http://www.securityfocus.com/bid/94367 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 52EXPL: 0

03 Oct 2016 — Drupal 8.x before 8.1.10 does not properly check for "Administer comments" permission, which allows remote authenticated users to set the visibility of comments for arbitrary nodes by leveraging rights to edit those nodes. Drupal 8.x en versiones anteriores a 8.1.10 no valida adecuadamente el permiso para "Administrar comentarios", lo que permite a usuarios remotos autenticados configurar la visibilidad de los comentarios para nodos arbitrarios aprovechando los derechos para editar estos nodos. • http://www.securityfocus.com/bid/93101 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 0%CPEs: 52EXPL: 0

03 Oct 2016 — Cross-site scripting (XSS) vulnerability in Drupal 8.x before 8.1.10 allows remote attackers to inject arbitrary web script or HTML via vectors involving an HTTP exception. Vulnerabilidad de XSS en Drupal 8.x en versiones anteriores a 8.1.10 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores que involucran una excepción HTTP. • http://www.securityfocus.com/bid/93101 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •