Page 7 of 54 results (0.005 seconds)

CVSS: 3.5EPSS: 0%CPEs: 6EXPL: 0

Cross-site scripting (XSS) vulnerability in the subscription functionality in the Project issue tracking module before 4.7.x-1.5, 4.7.x-2.x before 4.7.x-2.5, and 5.x-1.x before 5.x-1.1 for Drupal allows remote authenticated users with project create or edit permissions to inject arbitrary web script or HTML via unspecified vectors involving a (1) individual or (2) overview form. Vulnerabilidad de secuencia de comandos wn sitios cruzados (XSS) en la funcionalidad subscription en el asunto Project siguiendo el módulo anterior a 4.7.x-1.5, 4.7.x-2.x anterior a 4.7.x-2.5, y 5.x-1.x anterior a 5.x-1.1 para Drupal permite a usuarios remotos validados con proyecto crear o editar permisos inyectado secuencias de comandos web o HTML a través de vectores no especificados afectando al formulario (1) individual o (2) overview. • http://drupal.org/node/180568 http://osvdb.org/37962 http://secunia.com/advisories/27064 https://exchange.xforce.ibmcloud.com/vulnerabilities/36938 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Drupal 5.x before 5.2, and 4.7.x before 4.7.7, (1) allow remote attackers to inject arbitrary web script or HTML via "some server variables," including PHP_SELF; and (2) allow remote authenticated administrators to inject arbitrary web script or HTML via custom content type names. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Drupal 5.x anterior a 5.2, y 4.7.x anterior a 4.7.7, (1) permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de "algunas variables de servidor", incluyendo PHP_SELF; y (2) permiten a administradores autenticados remotamente inyectar secuencias de comandos web o HTML de su elección a través de nombres de tipo de contenido personalizados. • http://drupal.org/files/sa-2007-018/advisory.txt http://secunia.com/advisories/26224 http://www.securityfocus.com/bid/25097 http://www.vupen.com/english/advisories/2007/2697 https://exchange.xforce.ibmcloud.com/vulnerabilities/35637 https://exchange.xforce.ibmcloud.com/vulnerabilities/35638 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.5EPSS: 0%CPEs: 7EXPL: 0

The Project issue tracking module before 4.7.x-1.3, 4.7.x-2.* before 4.7.x-2.3, and 5 before 5.x-0.2-beta for Drupal allows remote authenticated users, with "access project issues" permission, to read the contents of a private node via a URL with a modified node identifier. El módulo Project anterior 4.7.x-1.3, 4.7.x-2.* anterior a 4.7.x-2.3, y 5 anterior 5.x-0.2-beta para Drupal permite a usuarios remotos validados, con permisos "asuntos de acceso a proyecto", leer el contenido de un nodo privado a través de una URL con un nodo identificador modificado. • http://drupal.org/node/125832 http://drupal.org/node/125833 http://osvdb.org/33913 http://secunia.com/advisories/24409 http://www.securityfocus.com/bid/22867 http://www.vupen.com/english/advisories/2007/0873 https://exchange.xforce.ibmcloud.com/vulnerabilities/32871 •

CVSS: 5.0EPSS: 9%CPEs: 12EXPL: 0

The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION. Los módulos para Drupal (1) Textimage 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1 y (2) Captcha 4.7.x versiones anteriores a 4.7-1.2 y 5.x versiones anteriores a 5.x-1.1, permiten a atacantes remotos evitar la comprobación CAPTCHA mediante un elemento vacío captcha in $_SESSION. • http://cvs.drupal.org/viewcvs/drupal/contributions/modules/captcha/captcha.module?r1=1.25.2.1&r2=1.25.2.2 http://cvs.drupal.org/viewcvs/drupal/contributions/modules/textimage/captcha.inc?r1=1.1&r2=1.1.2.1 http://drupal.org/node/114364 http://drupal.org/node/114519 http://osvdb.org/32137 http://osvdb.org/32138 http://secunia.com/advisories/23983 http://secunia.com/advisories/23985 http://www.securityfocus.com/bid/22329 http://www.vupen.com/english/advisor •

CVSS: 6.5EPSS: 3%CPEs: 2EXPL: 0

The comment_form_add_preview function in comment.module in Drupal before 4.7.6, and 5.x before 5.1, and vbDrupal, allows remote attackers with "post comments" privileges and access to multiple input filters to execute arbitrary code by previewing comments, which are not processed by "normal form validation routines." La función comment_form_add_preview en comment.module en Drupal anterior a versión 4.7.6, y versión 5.x anterior a 5.1, y vbDrupal, permite a los atacantes remotos con privilegios de "post comments" y acceso a múltiples filtros de entrada para ejecutar código arbitrario mediante la previsualización de comentarios, que no son procesados por "normal form validation routines". • http://archives.neohapsis.com/archives/bugtraq/2007-01/0670.html http://drupal.org/node/113935 http://osvdb.org/32136 http://secunia.com/advisories/23960 http://secunia.com/advisories/23990 http://www.securityfocus.com/bid/22306 http://www.vbdrupal.org/forum/showthread.php?t=786 http://www.vupen.com/english/advisories/2007/0406 http://www.vupen.com/english/advisories/2007/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/31940 •