Количество 1 988
Количество 1 988
CVE-2008-4793
The node module API in Drupal 5.x before 5.11 allows remote attackers ...
CVE-2008-4792
The core BlogAPI module in Drupal 5.x before 5.11 and 6.x before 6.5 does not properly validate unspecified content fields of an internal Drupal form, which allows remote authenticated users to bypass intended access restrictions via modified field values.
CVE-2008-4792
The core BlogAPI module in Drupal 5.x before 5.11 and 6.x before 6.5 does not properly validate unspecified content fields of an internal Drupal form, which allows remote authenticated users to bypass intended access restrictions via modified field values.
CVE-2008-4792
The core BlogAPI module in Drupal 5.x before 5.11 and 6.x before 6.5 d ...
CVE-2008-4791
The user module in Drupal 5.x before 5.11 and 6.x before 6.5 might allow remote authenticated users to bypass intended login access rules and successfully login via unknown vectors.
CVE-2008-4791
The user module in Drupal 5.x before 5.11 and 6.x before 6.5 might allow remote authenticated users to bypass intended login access rules and successfully login via unknown vectors.
CVE-2008-4791
The user module in Drupal 5.x before 5.11 and 6.x before 6.5 might all ...
CVE-2008-4790
The core upload module in Drupal 5.x before 5.11 allows remote authenticated users to bypass intended access restrictions and read "files attached to content" via unknown vectors.
CVE-2008-4790
The core upload module in Drupal 5.x before 5.11 allows remote authenticated users to bypass intended access restrictions and read "files attached to content" via unknown vectors.
CVE-2008-4790
The core upload module in Drupal 5.x before 5.11 allows remote authent ...
CVE-2008-4789
The validation functionality in the core upload module in Drupal 6.x before 6.5 allows remote authenticated users to bypass intended access restrictions and "attach files to content," related to a "logic error."
CVE-2008-4789
The validation functionality in the core upload module in Drupal 6.x b ...
CVE-2008-3744
Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.10 and 6.x before 6.4 allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) delete user access rules.
CVE-2008-3744
Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.10 and 6.x before 6.4 allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) delete user access rules.
CVE-2008-3744
Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5 ...
CVE-2008-3743
Multiple cross-site request forgery (CSRF) vulnerabilities in forms in Drupal 6.x before 6.4 allow remote attackers to perform unspecified actions via unknown vectors, related to improper token validation for (1) cached forms and (2) forms with AHAH elements.
CVE-2008-3743
Multiple cross-site request forgery (CSRF) vulnerabilities in forms in Drupal 6.x before 6.4 allow remote attackers to perform unspecified actions via unknown vectors, related to improper token validation for (1) cached forms and (2) forms with AHAH elements.
CVE-2008-3743
Multiple cross-site request forgery (CSRF) vulnerabilities in forms in ...
CVE-2008-3742
Unrestricted file upload vulnerability in the BlogAPI module in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, which is not validated.
CVE-2008-3742
Unrestricted file upload vulnerability in the BlogAPI module in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, which is not validated.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2008-4793 The node module API in Drupal 5.x before 5.11 allows remote attackers ... | CVSS2: 7.5 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4792 The core BlogAPI module in Drupal 5.x before 5.11 and 6.x before 6.5 does not properly validate unspecified content fields of an internal Drupal form, which allows remote authenticated users to bypass intended access restrictions via modified field values. | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4792 The core BlogAPI module in Drupal 5.x before 5.11 and 6.x before 6.5 does not properly validate unspecified content fields of an internal Drupal form, which allows remote authenticated users to bypass intended access restrictions via modified field values. | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4792 The core BlogAPI module in Drupal 5.x before 5.11 and 6.x before 6.5 d ... | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4791 The user module in Drupal 5.x before 5.11 and 6.x before 6.5 might allow remote authenticated users to bypass intended login access rules and successfully login via unknown vectors. | CVSS2: 6 | 1% Низкий | больше 17 лет назад | |
CVE-2008-4791 The user module in Drupal 5.x before 5.11 and 6.x before 6.5 might allow remote authenticated users to bypass intended login access rules and successfully login via unknown vectors. | CVSS2: 6 | 1% Низкий | больше 17 лет назад | |
CVE-2008-4791 The user module in Drupal 5.x before 5.11 and 6.x before 6.5 might all ... | CVSS2: 6 | 1% Низкий | больше 17 лет назад | |
CVE-2008-4790 The core upload module in Drupal 5.x before 5.11 allows remote authenticated users to bypass intended access restrictions and read "files attached to content" via unknown vectors. | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4790 The core upload module in Drupal 5.x before 5.11 allows remote authenticated users to bypass intended access restrictions and read "files attached to content" via unknown vectors. | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4790 The core upload module in Drupal 5.x before 5.11 allows remote authent ... | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4789 The validation functionality in the core upload module in Drupal 6.x before 6.5 allows remote authenticated users to bypass intended access restrictions and "attach files to content," related to a "logic error." | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-4789 The validation functionality in the core upload module in Drupal 6.x b ... | CVSS2: 6 | 0% Низкий | больше 17 лет назад | |
CVE-2008-3744 Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.10 and 6.x before 6.4 allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) delete user access rules. | CVSS2: 5.8 | 0% Низкий | больше 17 лет назад | |
CVE-2008-3744 Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x before 5.10 and 6.x before 6.4 allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) delete user access rules. | CVSS2: 5.8 | 0% Низкий | больше 17 лет назад | |
CVE-2008-3744 Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5 ... | CVSS2: 5.8 | 0% Низкий | больше 17 лет назад | |
CVE-2008-3743 Multiple cross-site request forgery (CSRF) vulnerabilities in forms in Drupal 6.x before 6.4 allow remote attackers to perform unspecified actions via unknown vectors, related to improper token validation for (1) cached forms and (2) forms with AHAH elements. | CVSS2: 5.8 | 0% Низкий | больше 17 лет назад | |
CVE-2008-3743 Multiple cross-site request forgery (CSRF) vulnerabilities in forms in Drupal 6.x before 6.4 allow remote attackers to perform unspecified actions via unknown vectors, related to improper token validation for (1) cached forms and (2) forms with AHAH elements. | CVSS2: 5.8 | 0% Низкий | больше 17 лет назад | |
CVE-2008-3743 Multiple cross-site request forgery (CSRF) vulnerabilities in forms in ... | CVSS2: 5.8 | 0% Низкий | больше 17 лет назад | |
CVE-2008-3742 Unrestricted file upload vulnerability in the BlogAPI module in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, which is not validated. | CVSS2: 6.5 | 3% Низкий | больше 17 лет назад | |
CVE-2008-3742 Unrestricted file upload vulnerability in the BlogAPI module in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, which is not validated. | CVSS2: 6.5 | 3% Низкий | больше 17 лет назад |
Уязвимостей на страницу