Количество 4
Количество 4

CVE-2014-5020
The File module in Drupal 7.x before 7.29 does not properly check permissions to view files, which allows remote authenticated users with certain permissions to bypass intended restrictions and read files by attaching the file to content with a file field.

CVE-2014-5020
The File module in Drupal 7.x before 7.29 does not properly check permissions to view files, which allows remote authenticated users with certain permissions to bypass intended restrictions and read files by attaching the file to content with a file field.
CVE-2014-5020
The File module in Drupal 7.x before 7.29 does not properly check perm ...
GHSA-fh8c-mghq-6w46
The File module in Drupal 7.x before 7.29 does not properly check permissions to view files, which allows remote authenticated users with certain permissions to bypass intended restrictions and read files by attaching the file to content with a file field.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2014-5020 The File module in Drupal 7.x before 7.29 does not properly check permissions to view files, which allows remote authenticated users with certain permissions to bypass intended restrictions and read files by attaching the file to content with a file field. | CVSS2: 4.9 | 0% Низкий | почти 11 лет назад |
![]() | CVE-2014-5020 The File module in Drupal 7.x before 7.29 does not properly check permissions to view files, which allows remote authenticated users with certain permissions to bypass intended restrictions and read files by attaching the file to content with a file field. | CVSS2: 4.9 | 0% Низкий | почти 11 лет назад |
CVE-2014-5020 The File module in Drupal 7.x before 7.29 does not properly check perm ... | CVSS2: 4.9 | 0% Низкий | почти 11 лет назад | |
GHSA-fh8c-mghq-6w46 The File module in Drupal 7.x before 7.29 does not properly check permissions to view files, which allows remote authenticated users with certain permissions to bypass intended restrictions and read files by attaching the file to content with a file field. | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу