Show filters
285 Total Results
Displaying 71-80 of 285
Sort by:
Attacker Value
Unknown
CVE-2010-2250
Disclosure Date: November 07, 2019 (last updated November 27, 2024)
Drupal 5.x and 6.x before 6.16 uses a user-supplied value in output during site installation which could allow an attacker to craft a URL and perform a cross-site scripting attack.
0
Attacker Value
Unknown
CVE-2010-2471
Disclosure Date: November 06, 2019 (last updated November 27, 2024)
Drupal versions 5.x and 6.x has open redirection
0
Attacker Value
Unknown
CVE-2019-11876
Disclosure Date: May 24, 2019 (last updated November 27, 2024)
In PrestaShop 1.7.5.2, the shop_country parameter in the install/index.php installation script/component is affected by Reflected XSS. Exploitation by a malicious actor requires the user to follow the initial stages of the setup (accepting terms and conditions) before executing the malicious link.
0
Attacker Value
Unknown
CVE-2019-10909
Disclosure Date: May 16, 2019 (last updated November 27, 2024)
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.
0
Attacker Value
Unknown
CVE-2019-10911
Disclosure Date: May 16, 2019 (last updated November 27, 2024)
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
0
Attacker Value
Unknown
CVE-2019-10910
Disclosure Date: May 16, 2019 (last updated November 27, 2024)
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.
0
Attacker Value
Unknown
CVE-2019-11831
Disclosure Date: May 09, 2019 (last updated November 08, 2023)
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
0
Attacker Value
Unknown
Drupal core - Highly critical - Remote Code Execution
Disclosure Date: February 21, 2019 (last updated February 08, 2025)
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
0
Attacker Value
Unknown
PHAR stream wrapper Arbitrary PHP code execution
Disclosure Date: January 22, 2019 (last updated November 08, 2023)
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
0
Attacker Value
Unknown
Files uploaded by anonymous users into a private file system can be accessed by…
Disclosure Date: January 22, 2019 (last updated November 08, 2023)
In Drupal core 8.x prior to 8.3.4 and Drupal core 7.x prior to 7.56; Private files that have been uploaded by an anonymous user but not permanently attached to content on the site should only be visible to the anonymous user that uploaded them, rather than all anonymous users. Drupal core did not previously provide this protection, allowing an access bypass vulnerability to occur. This issue is mitigated by the fact that in order to be affected, the site must allow anonymous users to upload files into a private file system.
0