Show filters
488 Total Results
Displaying 71-80 of 488
Sort by:
Attacker Value
Unknown
CVE-2024-12393
Disclosure Date: December 10, 2024 (last updated December 21, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Drupal Core allows Cross-Site Scripting (XSS).This issue affects Drupal Core: from 8.8.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.
0
Attacker Value
Unknown
CVE-2024-11942
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
A vulnerability in Drupal Core allows File Manipulation.This issue affects Drupal Core: from 10.0.0 before 10.2.10.
0
Attacker Value
Unknown
CVE-2024-11941
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
A vulnerability in Drupal Core allows Excessive Allocation.This issue affects Drupal Core: from 10.2.0 before 10.2.2, from 10.1.0 before 10.1.8.
0
Attacker Value
Unknown
CVE-2024-45440
Disclosure Date: August 29, 2024 (last updated September 20, 2024)
core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist.
0
Attacker Value
Unknown
CVE-2024-22362
Disclosure Date: January 16, 2024 (last updated January 24, 2024)
Drupal contains a vulnerability with improper handling of structural elements. If this vulnerability is exploited, an attacker may be able to cause a denial-of-service (DoS) condition.
0
Attacker Value
Unknown
CVE-2023-5256
Disclosure Date: September 28, 2023 (last updated October 09, 2023)
In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.
This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API.
The core REST and contributed GraphQL modules are not affected.
0
Attacker Value
Unknown
CVE-2018-25085
Disclosure Date: May 01, 2023 (last updated October 29, 2023)
A vulnerability classified as problematic was found in Responsive Menus 7.x-1.x-dev on Drupal. Affected by this vulnerability is the function responsive_menus_admin_form_submit of the file responsive_menus.module of the component Configuration Setting Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 7.x-1.7 is able to address this issue. The patch is named 3c554b31d32a367188f44d44857b061eac949fb8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-227755.
0
Attacker Value
Unknown
CVE-2023-31250
Disclosure Date: April 26, 2023 (last updated January 09, 2025)
The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating.
0
Attacker Value
Unknown
CVE-2022-25278
Disclosure Date: April 26, 2023 (last updated October 08, 2023)
Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to. No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected.
0
Attacker Value
Unknown
CVE-2022-25277
Disclosure Date: April 26, 2023 (last updated October 08, 2023)
Drupal core sanitizes filenames with dangerous extensions upon upload (reference: SA-CORE-2020-012) and strips leading and trailing dots from filenames to prevent uploading server configuration files (reference: SA-CORE-2019-010). However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow the upload of files with an htaccess extension, these files' filenames would not be properly sanitized. This could allow bypassing the protections provided by Drupal core's default .htaccess files and possible remote code execution on Apache web servers. This issue is mitigated by the fact that it requires a field administrator to explicitly configure a file field to allow htaccess as an extension (a restricted permission), or a contributed module or custom code that overrides allowed file uploads.
0