Логотип exploitDog
product: "drupal"
Консоль
Логотип exploitDog

exploitDog

product: "drupal"
Drupal

Drupalсистема управления контентом с открытым исходным кодом. На Drupal работает более миллиона сайтов — от личных блогов до сайтов компаний, политических партий и государственных организаций.

Релизный цикл, информация об уязвимостях

Продукт: Drupal
Вендор: drupal

График релизов

11.210.511.310.6202520262027

Недавние уязвимости Drupal

Количество 1 988

github логотип

GHSA-6c3j-c64m-qhgq

почти 7 лет назад

XSS in jQuery as used in Drupal, Backdrop CMS, and other products

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2019-11358

почти 7 лет назад

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2019-11358

почти 7 лет назад

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other produc ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2019-11358

почти 7 лет назад

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2019-11358

почти 7 лет назад

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2019-6341

почти 7 лет назад

In Drupal 7 versions prior to 7.65; Drupal 8.6 versions prior to 8.6.13;Drupal 8.5 versions prior to 8.5.14. Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.

CVSS3: 5.4
EPSS: Средний
debian логотип

CVE-2019-6341

почти 7 лет назад

In Drupal 7 versions prior to 7.65; Drupal 8.6 versions prior to 8.6.1 ...

CVSS3: 5.4
EPSS: Средний
ubuntu логотип

CVE-2019-6341

почти 7 лет назад

In Drupal 7 versions prior to 7.65; Drupal 8.6 versions prior to 8.6.13;Drupal 8.5 versions prior to 8.5.14. Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.

CVSS3: 5.4
EPSS: Средний
nvd логотип

CVE-2019-6340

почти 7 лет назад

Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)

CVSS3: 8.1
EPSS: Критический
debian логотип

CVE-2019-6340

почти 7 лет назад

Some field types do not properly sanitize data from non-form sources i ...

CVSS3: 8.1
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-6c3j-c64m-qhgq

XSS in jQuery as used in Drupal, Backdrop CMS, and other products

CVSS3: 6.1
2%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-11358

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVSS3: 6.1
2%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-11358

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other produc ...

CVSS3: 6.1
2%
Низкий
почти 7 лет назад
ubuntu логотип
CVE-2019-11358

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVSS3: 6.1
2%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-11358

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVSS3: 5.6
2%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-6341

In Drupal 7 versions prior to 7.65; Drupal 8.6 versions prior to 8.6.13;Drupal 8.5 versions prior to 8.5.14. Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.

CVSS3: 5.4
41%
Средний
почти 7 лет назад
debian логотип
CVE-2019-6341

In Drupal 7 versions prior to 7.65; Drupal 8.6 versions prior to 8.6.1 ...

CVSS3: 5.4
41%
Средний
почти 7 лет назад
ubuntu логотип
CVE-2019-6341

In Drupal 7 versions prior to 7.65; Drupal 8.6 versions prior to 8.6.13;Drupal 8.5 versions prior to 8.5.14. Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.

CVSS3: 5.4
41%
Средний
почти 7 лет назад
nvd логотип
CVE-2019-6340

Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)

CVSS3: 8.1
94%
Критический
почти 7 лет назад
debian логотип
CVE-2019-6340

Some field types do not properly sanitize data from non-form sources i ...

CVSS3: 8.1
94%
Критический
почти 7 лет назад

Уязвимостей на страницу


Поделиться