Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
drupal drupal 4.5.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3973
Multiple cross-site scripting (XSS) vulnerabilities in Drupal 4.5.0 up to and including 4.5.5 and 4.6.0 up to and including 4.6.3 allow remote malicious users to inject arbitrary web script or HTML via various HTML tags and values, such as the (1) legend tag and the value paramet...
Drupal Drupal 4.5.0
Drupal Drupal 4.5.1
Drupal Drupal 4.6.3
Drupal Drupal 4.5.4
Drupal Drupal 4.5.5
Drupal Drupal 4.6.0
Drupal Drupal 4.6.1
Drupal Drupal 4.6.2
Drupal Drupal 4.5.2
Drupal Drupal 4.5.3
NA
CVE-2005-3974
Drupal 4.5.0 up to and including 4.5.5 and 4.6.0 up to and including 4.6.3, when running on PHP5, does not correctly enforce user privileges, which allows remote malicious users to bypass the "access user profiles" permission.
Drupal Drupal 4.6
Drupal Drupal 4.6.1
Drupal Drupal 4.5.2
Drupal Drupal 4.5.3
Drupal Drupal 4.5.4
Drupal Drupal 4.5.5
Drupal Drupal 4.5
Drupal Drupal 4.5.1
Drupal Drupal 4.6.2
Drupal Drupal 4.6.3
NA
CVE-2006-2260
Cross-site scripting (XSS) vulnerability in the project module (project.module) in Drupal 4.5 and 4.6 allows remote malicious users to inject arbitrary web script or HTML via unknown attack vectors.
Drupal Drupal 4.5
Drupal Drupal 4.6.2
Drupal Drupal 4.6.3
Drupal Drupal 4.6
Drupal Drupal 4.6.1
Drupal Drupal 4.5.1
Drupal Drupal 4.5.2
Drupal Drupal 4.5.3
Drupal Drupal 4.5.4
Drupal Drupal 4.5.5
NA
CVE-2005-3975
Interpretation conflict in file.inc in Drupal 4.5.0 up to and including 4.5.5 and 4.6.0 up to and including 4.6.3 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF or JPEG file extension, which causes the HTML to be executed by...
Drupal Drupal 4.5.3
Drupal Drupal 4.5.4
Drupal Drupal 4.5.0
Drupal Drupal 4.6.1
Drupal Drupal 4.6.2
Drupal Drupal 4.6.3
Drupal Drupal 4.5.1
Drupal Drupal 4.5.2
Drupal Drupal 4.5.5
Drupal Drupal 4.6.0
NA
CVE-2006-4120
Cross-site scripting (XSS) vulnerability in the Recipe module (recipe.module) prior to 1.54 for Drupal 4.6 and previous versions allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Drupal Drupal 4.0
Drupal Drupal 4.4.0
Drupal Drupal 4.4.1
Drupal Drupal 4.5.5
Drupal Drupal 4.5.6
Drupal Drupal 4.5.1
Drupal Drupal 4.5.2
Drupal Recipe Module
Drupal Drupal 4.5.3
Drupal Drupal 4.5.4
Drupal Drupal 4.4.2
Drupal Drupal 4.5
Drupal Drupal 4.5.7
Drupal Drupal
NA
CVE-2006-1227
Drupal 4.5.x prior to 4.5.8 and 4.6.x prior to 4.5.8, when menu.module is used to create a menu item, does not implement access control for the page that is referenced, which might allow remote malicious users to access administrator pages.
Drupal Drupal 4.5.6
Drupal Drupal 4.5.7
Drupal Drupal 4.5.2
Drupal Drupal 4.5.3
Drupal Drupal 4.6.2
Drupal Drupal 4.6.3
Drupal Drupal 4.5.0
Drupal Drupal 4.5.1
Drupal Drupal 4.6.0
Drupal Drupal 4.6.1
Drupal Drupal 4.5.4
Drupal Drupal 4.5.5
Drupal Drupal 4.6.4
Drupal Drupal 4.6.5
NA
CVE-2007-6299
Multiple SQL injection vulnerabilities in Drupal and vbDrupal 4.7.x prior to 4.7.9 and 5.x prior to 5.4 allow remote malicious users to execute arbitrary SQL commands via modules that pass input to the taxonomy_select_nodes function, as demonstrated by the (1) taxonomy_menu, (2) ...
Drupal Drupal 4.4.1
Drupal Drupal 4.4.2
Drupal Drupal 4.5.5
Drupal Drupal 4.5.6
Drupal Drupal 4.6.2
Drupal Drupal 4.6.3
Drupal Drupal 4.7
Drupal Drupal 4.7.1
Drupal Drupal 4.7.8
Drupal Drupal 4.7 Rev1.15
Drupal Drupal 4.2.0 Rc
Drupal Drupal 4.4.0
Drupal Drupal 4.5.3
Drupal Drupal 4.5.4
Drupal Drupal 4.6.1
Drupal Drupal 4.6.10
Drupal Drupal 4.6.11
Drupal Drupal 4.6.8
Drupal Drupal 4.6.9
Drupal Drupal 4.7.6
Drupal Drupal 4.7.7
Drupal Drupal 4.0.0
NA
CVE-2008-0273
Interpretation conflict in Drupal 4.7.x prior to 4.7.11 and 5.x prior to 5.6, when Internet Explorer 6 is used, allows remote malicious users to conduct cross-site scripting (XSS) attacks via invalid UTF-8 byte sequences, which are not processed as UTF-8 by Drupal's HTML fil...
Drupal Drupal 4.0.0
Drupal Drupal 4.5.1
Drupal Drupal 4.5.2
Drupal Drupal 4.6
Drupal Drupal 4.6.1
Drupal Drupal 4.6.6
Drupal Drupal 4.6.7
Drupal Drupal 4.6.8
Drupal Drupal 4.7.4
Drupal Drupal 4.7.5
Drupal Drupal 5.0
Drupal Drupal 5.1
Drupal Drupal 4.4.3
Drupal Drupal 4.5
Drupal Drupal 4.5.7
Drupal Drupal 4.5.8
Drupal Drupal 4.6.4
Drupal Drupal 4.6.5
Drupal Drupal 4.7.2
Drupal Drupal 4.7.3
Drupal Drupal 4.7 Rev 1.15
Drupal Drupal 4.7 Rev 1.2
NA
CVE-2008-0276
Cross-site scripting (XSS) vulnerability in the Devel module prior to 5.x-0.1 for Drupal allows remote malicious users to inject arbitrary web script or HTML via a site variable, related to lack of escaping of the variable table.
Drupal Drupal 4.4
Drupal Drupal 4.4.1
Drupal Drupal 4.5.4
Drupal Drupal 4.5.5
Drupal Drupal 4.6.2
Drupal Drupal 4.6.3
Drupal Drupal 4.7
Drupal Drupal 4.7.1
Drupal Drupal 4.7.7
Drupal Drupal 4.7.8
Drupal Drupal 5.3
Drupal Drupal 5.4
Drupal Drupal 4.1.0
Drupal Drupal 4.2.0 Rc
Drupal Drupal 4.5.2
Drupal Drupal 4.5.3
Drupal Drupal 4.6.1
Drupal Drupal 4.6.10
Drupal Drupal 4.6.11
Drupal Drupal 4.6.8
Drupal Drupal 4.6.9
Drupal Drupal 4.7.5
NA
CVE-2008-0272
Cross-site request forgery (CSRF) vulnerability in the aggregator module in Drupal 4.7.x prior to 4.7.11 and 5.x prior to 5.6 allows remote malicious users to delete items from a feed as privileged users.
Drupal Drupal 4.5
Drupal Drupal 4.5.1
Drupal Drupal 4.5.8
Drupal Drupal 4.6
Drupal Drupal 4.6.5
Drupal Drupal 4.6.6
Drupal Drupal 4.7.3
Drupal Drupal 4.7.4
Drupal Drupal 4.7 Rev 1.2
Drupal Drupal 5.0
Drupal Drupal 4.2.0 Rc
Drupal Drupal 4.4
Drupal Drupal 4.5.4
Drupal Drupal 4.5.5
Drupal Drupal 4.6.11
Drupal Drupal 4.6.2
Drupal Drupal 4.6.9
Drupal Drupal 4.7
Drupal Drupal 4.4.1
Drupal Drupal 4.4.2
Drupal Drupal 4.4.3
Drupal Drupal 4.5.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »