Filtered by vendor Drupal
Subscriptions
Total
834 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2008-3500 | 1 Drupal | 1 Suggested Terms Module | 2024-08-07 | N/A |
Cross-site scripting (XSS) vulnerability in the Suggested Terms module 5.x before 5.x-1.2 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via crafted Taxonomy terms. | ||||
CVE-2008-3220 | 2 Drupal, Fedoraproject | 2 Drupal, Fedora | 2024-08-07 | N/A |
Cross-site request forgery (CSRF) vulnerability in Drupal 5.x before 5.8 and 6.x before 6.3 allows remote attackers to perform administrative actions via vectors involving deletion of "translated strings." | ||||
CVE-2008-3223 | 2 Drupal, Fedoraproject | 2 Drupal, Fedora | 2024-08-07 | N/A |
SQL injection vulnerability in the Schema API in Drupal 6.x before 6.3 allows remote attackers to execute arbitrary SQL commands via vectors related to "an inappropriate placeholder for 'numeric' fields." | ||||
CVE-2008-3221 | 2 Drupal, Fedoraproject | 2 Drupal, Fedora | 2024-08-07 | N/A |
Cross-site request forgery (CSRF) vulnerability in Drupal 6.x before 6.3 allows remote attackers to perform administrative actions via vectors involving deletion of OpenID identities. | ||||
CVE-2008-3218 | 2 Drupal, Fedoraproject | 2 Drupal, Fedora | 2024-08-07 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Drupal 6.x before 6.3 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) free tagging taxonomy terms, which are not properly handled on node preview pages, and (2) unspecified OpenID values. | ||||
CVE-2008-3219 | 2 Drupal, Fedoraproject | 2 Drupal, Fedora | 2024-08-07 | N/A |
The Drupal filter_xss_admin function in 5.x before 5.8 and 6.x before 6.3 does not "prevent use of the object HTML tag in administrator input," which has unknown impact and attack vectors, probably related to an insufficient cross-site scripting (XSS) protection mechanism. | ||||
CVE-2008-3222 | 2 Drupal, Fedoraproject | 2 Drupal, Fedora | 2024-08-07 | N/A |
Session fixation vulnerability in Drupal 5.x before 5.9 and 6.x before 6.3, when contributed modules "terminate the current request during a login event," allows remote attackers to hijack web sessions via unknown vectors. | ||||
CVE-2008-3091 | 1 Drupal | 1 Taxonomy Autotagger Module | 2024-08-07 | N/A |
Cross-site scripting (XSS) vulnerability in the Taxonomy Autotagger module 5.x before 5.x-1.8 for Drupal allows remote authenticated users, with create or edit post permissions, to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2008-3096 | 1 Drupal | 1 Outline Designer Module | 2024-08-07 | N/A |
The Outline Designer module 5.x before 5.x-1.4 for Drupal changes each content reader's authentication level to match that of the content author, which might allow remote attackers to gain privileges. | ||||
CVE-2008-3092 | 1 Drupal | 1 Taxonomy Autotagger Module | 2024-08-07 | N/A |
SQL injection vulnerability in the Taxonomy Autotagger module 5.x before 5.x-1.8 for Drupal allows remote authenticated users, with create or edit post permissions, to execute arbitrary SQL commands via unspecified vectors. | ||||
CVE-2008-3097 | 1 Drupal | 1 Tinytax Taxonomy Block Module | 2024-08-07 | N/A |
Cross-site scripting (XSS) vulnerability in the Tinytax module (aka Tinytax taxonomy block) 5.x before 5.x-1.10-1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML, probably by creating a crafted taxonomy term. | ||||
CVE-2008-3095 | 1 Drupal | 1 Organic Groups Module | 2024-08-07 | N/A |
Cross-site scripting (XSS) vulnerability in the Organic Groups (OG) module 5.x before 5.x-7.3 and 6.x before 6.x-1.0-RC1, a module for Drupal, allows remote authenticated users, with group owner permissions, to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2008-3001 | 1 Drupal | 1 Aggregation Module | 2024-08-07 | N/A |
The Aggregation module 5.x before 5.x-4.4 for Drupal allows remote attackers to upload files with arbitrary extensions, and possibly execute arbitrary code, via a crafted feed that allows upload of files with arbitrary extensions. | ||||
CVE-2008-2999 | 1 Drupal | 2 Aggregation Module, Drupal | 2024-08-07 | N/A |
Multiple SQL injection vulnerabilities in the Aggregation module 5.x before 5.x-4.4 for Drupal allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | ||||
CVE-2008-2998 | 1 Drupal | 2 Aggregation Module, Drupal | 2024-08-07 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in the Aggregation module 5.x before 5.x-4.4 for Drupal allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2008-3000 | 1 Drupal | 1 Aggregation Module | 2024-08-07 | N/A |
The Aggregation module 5.x before 5.x-4.4 for Drupal, when node access modules are used, does not properly implement access control, which allows remote attackers to bypass intended restrictions. | ||||
CVE-2008-2850 | 1 Drupal | 1 Trailscout Module | 2024-08-07 | N/A |
SQL injection vulnerability in the TrailScout module 5.x before 5.x-1.4 for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified cookies, related to improper use of the Drupal database API. | ||||
CVE-2008-2849 | 1 Drupal | 1 Trailscout Module | 2024-08-07 | N/A |
Cross-site scripting (XSS) vulnerability in the TrailScout module 5.x before 5.x-1.4 for Drupal allows remote authenticated users, with create post permissions, to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2008-2772 | 1 Drupal | 1 Magic Tabs Module | 2024-08-07 | N/A |
The Magic Tabs module 5.x before 5.x-1.1 for Drupal allows remote attackers to execute arbitrary PHP code via unspecified URL arguments, possibly related to a missing "whitelist of callbacks." | ||||
CVE-2008-2771 | 1 Drupal | 2 Drupal, Node Hierarchy Module | 2024-08-07 | N/A |
The Node Hierarchy module 5.x before 5.x-1.1 and 6.x before 6.x-1.0 for Drupal does not properly implement access checks, which allows remote attackers with "access content" permissions to bypass restrictions and modify the node hierarchy via unspecified attack vectors. |