Total
708 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-6377 | 1 Drupal | 1 Drupal | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
When adding a private file via the editor in Drupal 8.2.x before 8.2.7, the editor will not correctly check access for the file being attached, resulting in an access bypass. | |||||
CVE-2016-9451 | 1 Drupal | 1 Drupal | 2023-12-10 | 4.9 MEDIUM | 6.8 MEDIUM |
Confirmation forms in Drupal 7.x before 7.52 make it easier for remote authenticated users to conduct open redirect attacks via unspecified vectors. | |||||
CVE-2016-9452 | 1 Drupal | 1 Drupal | 2023-12-10 | 4.3 MEDIUM | 6.5 MEDIUM |
The transliterate mechanism in Drupal 8.x before 8.2.3 allows remote attackers to cause a denial of service via a crafted URL. | |||||
CVE-2016-9449 | 1 Drupal | 1 Drupal | 2023-12-10 | 4.0 MEDIUM | 4.3 MEDIUM |
The taxonomy module in Drupal 7.x before 7.52 and 8.x before 8.2.3 might allow remote authenticated users to obtain sensitive information about taxonomy terms by leveraging inconsistent naming of access query tags. | |||||
CVE-2016-7570 | 1 Drupal | 1 Drupal | 2023-12-10 | 4.0 MEDIUM | 4.3 MEDIUM |
Drupal 8.x before 8.1.10 does not properly check for "Administer comments" permission, which allows remote authenticated users to set the visibility of comments for arbitrary nodes by leveraging rights to edit those nodes. | |||||
CVE-2016-3162 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 6.5 MEDIUM | 8.1 HIGH |
The File module in Drupal 7.x before 7.43 and 8.x before 8.0.4 allows remote authenticated users to bypass access restrictions and read, delete, or substitute a link to a file uploaded to an unprocessed form by leveraging permission to create content or comment and upload files. | |||||
CVE-2016-3164 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 5.8 MEDIUM | 7.4 HIGH |
Drupal 6.x before 6.38, 7.x before 7.43, and 8.x before 8.0.4 might allow remote attackers to conduct open redirect attacks by leveraging (1) custom code or (2) a form shown on a 404 error page, related to path manipulation. | |||||
CVE-2015-3231 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 4.0 MEDIUM | N/A |
The Render cache system in Drupal 7.x before 7.38, when used to cache content by user role, allows remote authenticated users to obtain private content viewed by user 1 by reading the cache. | |||||
CVE-2015-3232 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 5.8 MEDIUM | N/A |
Open redirect vulnerability in the Field UI module in Drupal 7.x before 7.38 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the destinations parameter. | |||||
CVE-2015-3233 | 1 Drupal | 1 Drupal | 2023-12-10 | 5.8 MEDIUM | N/A |
Open redirect vulnerability in the Overlay module in Drupal 7.x before 7.38 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | |||||
CVE-2015-6658 | 1 Drupal | 1 Drupal | 2023-12-10 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the Autocomplete system in Drupal 6.x before 6.37 and 7.x before 7.39 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, related to uploading files. | |||||
CVE-2016-3165 | 1 Drupal | 1 Drupal | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
The Form API in Drupal 6.x before 6.38 ignores access restrictions on submit buttons, which might allow remote attackers to bypass intended access restrictions by leveraging permission to submit a form with a button that has "#access" set to FALSE in the server-side form definition. | |||||
CVE-2016-3168 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 8.5 HIGH | 6.4 MEDIUM |
The System module in Drupal 6.x before 6.38 and 7.x before 7.43 might allow remote attackers to hijack the authentication of site administrators for requests that download and run files with arbitrary JSON-encoded content, aka a "reflected file download vulnerability." | |||||
CVE-2016-3163 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
The XML-RPC system in Drupal 6.x before 6.38 and 7.x before 7.43 might make it easier for remote attackers to conduct brute-force attacks via a large number of calls made at once to the same method. | |||||
CVE-2016-3171 | 3 Debian, Drupal, Php | 3 Debian Linux, Drupal, Php | 2023-12-10 | 6.8 MEDIUM | 8.1 HIGH |
Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before 5.5.29, or 5.6.x before 5.6.13, might allow remote attackers to execute arbitrary code via vectors related to session data truncation. | |||||
CVE-2015-6661 | 1 Drupal | 1 Drupal | 2023-12-10 | 5.0 MEDIUM | N/A |
Drupal 6.x before 6.37 and 7.x before 7.39 allows remote attackers to obtain sensitive node titles by reading the menu. | |||||
CVE-2015-3234 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 4.3 MEDIUM | N/A |
The OpenID module in Drupal 6.x before 6.36 and 7.x before 7.38 allows remote attackers to log into other users' accounts by leveraging an OpenID identity from certain providers, as demonstrated by the Verisign, LiveJournal, and StackExchange providers. | |||||
CVE-2016-3169 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 6.8 MEDIUM | 8.1 HIGH |
The User module in Drupal 6.x before 6.38 and 7.x before 7.43 allows remote attackers to gain privileges by leveraging contributed or custom code that calls the user_save function with an explicit category and loads all roles into the array. | |||||
CVE-2016-7572 | 1 Drupal | 1 Drupal | 2023-12-10 | 4.0 MEDIUM | 4.3 MEDIUM |
The system.temporary route in Drupal 8.x before 8.1.10 does not properly check for "Export configuration" permission, which allows remote authenticated users to bypass intended access restrictions and read a full config export via unspecified vectors. | |||||
CVE-2016-3166 | 2 Debian, Drupal | 2 Debian Linux, Drupal | 2023-12-10 | 4.3 MEDIUM | 5.9 MEDIUM |
CRLF injection vulnerability in the drupal_set_header function in Drupal 6.x before 6.38, when used with PHP before 5.1.2, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by leveraging a module that allows user-submitted data to appear in HTTP headers. |