Search for packages
purl | pkg:composer/drupal/drupal@8.0-alpha11 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-539x-pa7r-aaaf
Aliases: CVE-2018-7600 GHSA-7fh9-933g-885p |
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations. |
Affected by 57 other vulnerabilities. Affected by 47 other vulnerabilities. Affected by 46 other vulnerabilities. Affected by 46 other vulnerabilities. |
VCID-621d-xgjn-aaaq
Aliases: SA-CORE-2018-003 |
XSS Vulnerability CKEditor, a third-party JavaScript library included in Drupal core, is affected by a cross-site scripting (XSS) vulnerability. It's possible to execute XSS inside CKEditor when using the `image2` plugin. |
Affected by 44 other vulnerabilities. Affected by 44 other vulnerabilities. |
VCID-agc9-wc5b-aaag
Aliases: CVE-2017-6920 GHSA-9c24-g32g-35rj |
PECL YAML parser unsafe object handling PECL YAML parser does not handle PHP objects safely during certain operations within Drupal core. This can lead to remote code execution. |
Affected by 57 other vulnerabilities. |
VCID-b73a-2aef-aaam
Aliases: CVE-2016-9450 GHSA-98w5-wqp9-w466 |
Incorrect cache context on password reset page The user password reset form does not specify a proper cache context, which can lead to cache poisoning and unwanted content on the page. |
Affected by 64 other vulnerabilities. |
VCID-b8a9-wxjv-aaar
Aliases: CVE-2016-9452 GHSA-jpj8-49hr-wcwv |
Denial of service via transliterate mechanism A specially crafted URL can cause a denial of service via the transliterate mechanism. |
Affected by 64 other vulnerabilities. |
VCID-cbqm-jpus-aaag
Aliases: CVE-2016-7570 GHSA-6g9h-6v79-w4pc |
Unprivileged access to "Administer comments" Users who have rights to edit a node can set the visibility on comments for that node. This should be restricted to those who have the administer comments permission. |
Affected by 65 other vulnerabilities. |
VCID-fcuw-cqny-aaae
Aliases: CVE-2017-6926 GHSA-2p28-5mvp-2j2r |
Comment reply form allows access to restricted content Users with permission to post comments are able to view content and comments they do not have access to, and are also able to add comments to this content. This vulnerability is mitigated by the fact that the comment system must be enabled and the attacker must have permission to post comments. |
Affected by 48 other vulnerabilities. |
VCID-mxdp-kn3v-aaab
Aliases: CVE-2019-10909 GHSA-g996-q5r8-w7g2 |
Escape validation messages in the PHP templating engine |
Affected by 27 other vulnerabilities. Affected by 27 other vulnerabilities. |
VCID-nmnf-at11-aaag
Aliases: CVE-2017-6922 GHSA-58f3-cx8p-h8jg |
Files uploaded by anonymous users accessed by other users Private files that have been uploaded by an anonymous user but not permanently attached to content on the site should only be visible to the anonymous user that uploaded them, rather than all anonymous users. Drupal core does not provide this protection, allowing an access bypass vulnerability to occur. This issue is mitigated by the fact that in order to be affected, the site must allow anonymous users to upload files into a private file system. |
Affected by 57 other vulnerabilities. |
VCID-nus4-1g5j-aaae
Aliases: CVE-2016-7572 GHSA-fmqh-2j2x-vgp3 |
Unprivileged access to config export The `system.temporary` route allows the download of a full config export. The full config export should be limited to those with "Export configuration" permission. |
Affected by 65 other vulnerabilities. |
VCID-r8jq-7x4r-aaaq
Aliases: GHSA-wxfg-253g-m7r4 |
Drupal core Open Redirect vulnerability | There are no reported fixed by versions. |
VCID-rfhb-dusd-aaak
Aliases: CVE-2016-7571 GHSA-vhg8-x858-7wq6 |
Cross-site Scripting in HTTP exceptions An attacker can create a specially crafted url, which can execute arbitrary code in the victim’s browser if loaded. Drupal is not properly sanitizing an exception. |
Affected by 65 other vulnerabilities. |
VCID-sexy-1ad2-aaab
Aliases: CVE-2017-6927 GHSA-585j-5449-mf5m |
JavaScript cross-site scripting prevention is incomplete Drupal has a Drupal.checkPlain() JavaScript function which is used to escape potentially dangerous text before outputting it to HTML (as JavaScript output is not auto-escaped by either Drupal 7 or Drupal 8). This function does not correctly handle all methods of injecting malicious HTML, leading to a cross-site scripting vulnerability under certain circumstances. The PHP functions which Drupal provides for HTML escaping are not affected. |
Affected by 48 other vulnerabilities. |
VCID-tmu9-vjgy-aaab
Aliases: CVE-2018-7602 GHSA-297x-j9pm-xjgg |
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild. |
Affected by 43 other vulnerabilities. Affected by 43 other vulnerabilities. |
VCID-v7k7-r3h5-aaar
Aliases: CVE-2017-6930 GHSA-3327-jr93-7hq3 |
Language fallback can be incorrect on multilingual sites with node access restrictions When using node access controls with a multilingual site, Drupal marks the untranslated version of a node as the default fallback for access queries. This fallback is used for languages that do not yet have a translated version of the created node. This can result in an access bypass vulnerability. This issue is mitigated by the fact that it only applies to sites that a) use the Content Translation module; and b) use a node access module such as Domain Access which implement hook_node_access_records(). Note that the update will mark the node access tables as needing a rebuild, which will take a long time on sites with a large number of nodes. |
Affected by 48 other vulnerabilities. |
VCID-y5c8-pny8-aaac
Aliases: CVE-2017-6921 GHSA-h377-287m-w2r9 |
File REST resource does not properly validate The file REST resource does not properly validate some fields when manipulating files. the file REST resource is enabled and allows PATCH requests, and an attacker can get or register a user account on the site with permissions to upload files and to modify the file resource. |
Affected by 57 other vulnerabilities. |
VCID-zjga-wdx7-aaan
Aliases: CVE-2016-9449 GHSA-p745-347h-hjfw |
Unprivileged access to taxonomy terms Modules wishing to restrict access to taxonomy terms may be incompatible with queries generated both by Drupal core as well as those generated by contributed modules like Entity Reference. As a result, information on taxonomy terms may be disclosed to unprivileged users. |
Affected by 64 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |