7.5
CVSSv2

CVE-2015-6659

Published: 24/08/2015 Updated: 24/12/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in the SQL comment filtering system in the Database API in Drupal 7.x prior to 7.39 allows remote malicious users to execute arbitrary SQL commands via an SQL comment.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

drupal drupal 7.0

drupal drupal 7.1

drupal drupal 7.10

drupal drupal 7.17

drupal drupal 7.18

drupal drupal 7.24

drupal drupal 7.25

drupal drupal 7.34

drupal drupal 7.35

drupal drupal 7.7

drupal drupal 7.8

drupal drupal 7.15

drupal drupal 7.16

drupal drupal 7.22

drupal drupal 7.23

drupal drupal 7.3

drupal drupal 7.30

drupal drupal 7.33

drupal drupal 7.5

drupal drupal 7.6

drupal drupal 7.11

drupal drupal 7.12

drupal drupal 7.19

drupal drupal 7.2

drupal drupal 7.26

drupal drupal 7.27

drupal drupal 7.36

drupal drupal 7.37

drupal drupal 7.9

drupal drupal 7.x-dev

drupal drupal 7.13

drupal drupal 7.14

drupal drupal 7.20

drupal drupal 7.21

drupal drupal 7.28

drupal drupal 7.29

drupal drupal 7.38

drupal drupal 7.4

Vendor Advisories

Several vulnerabilities were discovered in Drupal, a content management framework: CVE-2015-6658 The form autocomplete functionality did not properly sanitize the requested URL, allowing remote attackers to perform a cross-site scripting attack CVE-2015-6659 The SQL comment filtering system could allow a user with elevated per ...