Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
drupal drupal 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-6136
Unspecified vulnerability in EveryBlog 5.x and 6.x, a module for Drupal, allows remote malicious users to gain privileges as another user or an administrator via unknown attack vectors.
Drupal Everyblog 5.0
Drupal Everyblog 6.0
NA
CVE-2008-6134
SQL injection vulnerability in EveryBlog 5.x and 6.x, a module for Drupal, allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Drupal Everyblog 6.0
Drupal Everyblog 5.0
NA
CVE-2008-6135
Cross-site scripting (XSS) vulnerability in EveryBlog 5.x and 6.x, a module for Drupal, allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Drupal Everyblog 6.0
Drupal Everyblog 5.0
NA
CVE-2008-6137
EveryBlog 5.x and 6.x, a module for Drupal, allows remote malicious users to bypass access restrictions via unknown vectors.
Drupal Everyblog 6.0
Drupal Everyblog 5.0
NA
CVE-2008-4790
The core upload module in Drupal 5.x prior to 5.11 allows remote authenticated users to bypass intended access restrictions and read "files attached to content" via unknown vectors.
Drupal Drupal 5.5
Drupal Drupal 5.4
Drupal Drupal 5.0
Drupal Drupal 5.3
Drupal Drupal 5.2
Drupal Drupal 5.9
Drupal Drupal 5.8
Drupal Drupal 5.1
Drupal Drupal 5.7
Drupal Drupal 5.6
Drupal Drupal
NA
CVE-2008-4793
The node module API in Drupal 5.x prior to 5.11 allows remote malicious users to bypass node validation and have unspecified other impact via unknown vectors related to contributed modules.
Drupal Drupal 5.4
Drupal Drupal 5.3
Drupal Drupal 5.0
Drupal Drupal 5.9
Drupal Drupal 5.2
Drupal Drupal 5.1
Drupal Drupal 5.8
Drupal Drupal 5.7
Drupal Drupal
Drupal Drupal 5.6
Drupal Drupal 5.5
NA
CVE-2008-3741
The private filesystem in Drupal 5.x prior to 5.10 and 6.x prior to 6.4 trusts the MIME type sent by a web browser, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks by uploading files containing arbitrary web script or HTML.
Drupal Drupal 5.5
Drupal Drupal 5.6
Drupal Drupal 5.7
Drupal Drupal 5.3
Drupal Drupal 5.4
Drupal Drupal 6.2
Drupal Drupal 6.3
Drupal Drupal 5.1
Drupal Drupal 5.2
Drupal Drupal 6.0
Drupal Drupal 6.1
Drupal Drupal 5.0
Drupal Drupal 5.8
Drupal Drupal 5.9
NA
CVE-2008-3742
Unrestricted file upload vulnerability in the BlogAPI module in Drupal 5.x prior to 5.10 and 6.x prior to 6.4 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, which is not validated.
Drupal Drupal 5.0
Drupal Drupal 5.7
Drupal Drupal 5.8
Drupal Drupal 5.5
Drupal Drupal 5.6
Drupal Drupal 6.3
Drupal Drupal 5.3
Drupal Drupal 5.4
Drupal Drupal 6.1
Drupal Drupal 6.2
Drupal Drupal 5.1
Drupal Drupal 5.2
Drupal Drupal 5.9
Drupal Drupal 6.0
NA
CVE-2008-3744
Multiple cross-site request forgery (CSRF) vulnerabilities in Drupal 5.x prior to 5.10 and 6.x prior to 6.4 allow remote malicious users to hijack the authentication of administrators for requests that (1) add or (2) delete user access rules.
Drupal Drupal 5.4
Drupal Drupal 5.5
Drupal Drupal 6.2
Drupal Drupal 6.3
Drupal Drupal 5.2
Drupal Drupal 5.3
Drupal Drupal 6.0
Drupal Drupal 6.1
Drupal Drupal 5.0
Drupal Drupal 5.1
Drupal Drupal 5.8
Drupal Drupal 5.9
Drupal Drupal 5.6
Drupal Drupal 5.7
NA
CVE-2008-3740
Cross-site scripting (XSS) vulnerability in the output filter in Drupal 5.x prior to 5.10 and 6.x prior to 6.4 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Drupal Drupal 5.4
Drupal Drupal 5.5
Drupal Drupal 6.2
Drupal Drupal 6.3
Drupal Drupal 5.2
Drupal Drupal 5.3
Drupal Drupal 6.0
Drupal Drupal 6.1
Drupal Drupal 5.0
Drupal Drupal 5.1
Drupal Drupal 5.8
Drupal Drupal 5.9
Drupal Drupal 5.6
Drupal Drupal 5.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »