From ede485957c0d902a3f1e19d4ca5140551fa89bc5 Mon Sep 17 00:00:00 2001 From: Erwin Lansing Date: Sat, 16 Jul 2005 11:29:43 +0000 Subject: Add an entry for the drupal vulnerabilities. --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b8630133e335..5eeec61b7637 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,33 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + Drupal -- PHP code execution vulnerabilities + + + drupal + 4.6.2 + + + + +

Kuba Zygmunt discovered a flaw in the input validation routines + of Drupal's filter mechanism. An attacker could execute + arbitrary PHP code on a target site when public comments or + postings are allowed.

+ +
+ + CAN-2005-1921 + CAN-2005-2106 + http://drupal.org/files/sa-2005-002/advisory.txt + + + 2005-06-29 + 2005-07-16 + +
+ phpSysInfo -- cross site scripting vulnerability -- cgit v1.2.3