CVE-2008-0576
- EPSS 0.3%
- Published 05.02.2008 02:00:00
- Last modified 09.04.2025 00:30:58
Cross-site scripting (XSS) vulnerability in the Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and earlier in the 5.x-1.x series, 4.7.x-2.6 and earlier in the 4.7.x-2.x series, and 4.7.x-1.6 and earlier in th...
CVE-2008-0577
- EPSS 0.25%
- Published 05.02.2008 02:00:00
- Last modified 09.04.2025 00:30:58
The Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and earlier in the 5.x-1.x series, 4.7.x-2.6 and earlier in the 4.7.x-2.x series, and 4.7.x-1.6 and earlier in the 4.7.x-1.x series for Drupal (1) does not r...
- EPSS 0.27%
- Published 20.08.2007 22:17:00
- Last modified 09.04.2025 00:30:58
The Drupal Project module before 5.x-1.0, 4.7.x-2.3, and 4.7.x-1.3 and Project issue tracking module before 5.x-1.0, 4.7.x-2.4, and 4.7.x-1.4 do not properly enforce permissions, which allows remote attackers to (1) obtain sensitive via the Tracker M...
CVE-2007-0534
- EPSS 0.51%
- Published 26.01.2007 01:28:00
- Last modified 09.04.2025 00:30:58
Multiple cross-site scripting (XSS) vulnerabilities in the (1) Project issue tracking 4.7.0 through 5.x before 20070123 and (2) Project 4.6.0 through 5.x before 20070123 modules for Drupal allow remote authenticated users to inject arbitrary web scri...
CVE-2007-0505
- EPSS 2.63%
- Published 26.01.2007 00:28:00
- Last modified 09.04.2025 00:30:58
Unrestricted file upload vulnerability in the Project issue tracking 4.7.0 through 5.x before 20070123, a module for Drupal, allows remote authenticated users to execute arbitrary code by attaching a file with executable or multiple extensions to a p...
- EPSS 0.45%
- Published 26.01.2007 00:28:00
- Last modified 09.04.2025 00:30:58
The project_issue_access function in the Project issue tracking 4.7.0 through 5.x before 20070123 module for Drupal allows remote authenticated users to bypass other access control modules and obtain attached files by guessing the filename, and obtai...