Page 8 of 38 results (0.016 seconds)

CVSS: 5.0EPSS: 3%CPEs: 6EXPL: 1

Unknown vulnerability in Drupal 4.5.0 through 4.5.3, 4.6.0, and 4.6.1 allows remote attackers to execute arbitrary PHP code via a public comment or posting. • https://www.exploit-db.com/exploits/1088 http://marc.info/?l=bugtraq&m=112015287827452&w=2 http://secunia.com/advisories/15872 http://www.debian.org/security/2005/dsa-745 http://www.drupal.org/security/drupal-sa-2005-002/advisory.txt http://www.securityfocus.com/bid/14110 •

CVSS: 7.5EPSS: 95%CPEs: 6EXPL: 6

Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement. • https://www.exploit-db.com/exploits/43829 https://www.exploit-db.com/exploits/16882 https://www.exploit-db.com/exploits/1078 https://www.exploit-db.com/exploits/1083 https://www.exploit-db.com/exploits/1084 http://marc.info/?l=bugtraq&m=112008638320145&w=2 http://marc.info/?l=bugtraq&m=112015336720867&w=2 http://marc.info/?l=bugtraq&m=112605112027335&w=2 http://pear.php.net/package/XML_RPC/download/1.3.1 http://secunia.com/advisories/15810 http: • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

Unknown vulnerability in the privilege system in Drupal 4.4.0 through 4.6.0, when public registration is enabled, allows remote attackers to gain privileges, due to an "input check" that "is not implemented properly." • http://archives.neohapsis.com/archives/fulldisclosure/2005-06/0010.html http://marc.info/?l=bugtraq&m=111782257601422&w=2 http://secunia.com/advisories/15372 http://www.osvdb.org/17028 •