English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.54366
Category:FreeBSD Local Security Checks
Title:FreeBSD Ports: drupal
Summary:FreeBSD Ports: drupal
Description:The remote host is missing an update to the system
as announced in the referenced advisory.

The following package is affected: drupal

CVE-2005-1921
PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc), as used in
products such as WordPress, Serendipity, Drupal, egroupware, and
others, allows remote attackers to execute arbitrary PHP code via an
XML file, which is not properly sanitized before being used in an eval
statement.

CVE-2005-2106
Unknown vulnerability in Drupal 4.5.0 through 4.5.3, 4.6.0, and 4.6.1
allows remote attackers to execute arbitrary PHP code via a public
comment or posting.

Solution:
Update your system with the appropriate patches or
software upgrades.

http://drupal.org/files/sa-2005-002/advisory.txt
http://www.vuxml.org/freebsd/f241641e-f5ea-11d9-a6db-000d608ed240.html
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-1921
Bugtraq: 20050629 Advisory 02/2005: Remote code execution in Serendipity (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=112008638320145&w=2
http://pear.php.net/package/XML_RPC/download/1.3.1
http://www.gulftech.org/?node=research&article_id=00087-07012005
http://www.hardened-php.net/advisory-022005.php
Debian Security Information: DSA-745 (Google Search)
http://www.debian.org/security/2005/dsa-745
Debian Security Information: DSA-747 (Google Search)
http://www.debian.org/security/2005/dsa-747
Debian Security Information: DSA-789 (Google Search)
http://www.debian.org/security/2005/dsa-789
Debian Security Information: DSA-746 (Google Search)
http://www.debian.org/security/2005/dsa-746
http://security.gentoo.org/glsa/glsa-200507-01.xml
http://security.gentoo.org/glsa/glsa-200507-06.xml
http://security.gentoo.org/glsa/glsa-200507-07.xml
HPdes Security Advisory: HPSBTU02083
http://www.securityfocus.com/archive/1/archive/1/419064/100/0/threaded
HPdes Security Advisory: SSRT051069
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
http://www.redhat.com/support/errata/RHSA-2005-564.html
SuSE Security Announcement: SUSE-SA:2005:051 (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=112605112027335&w=2
Bugtraq: 20050629 [DRUPAL-SA-2005-003] Drupal 4.6.2 / 4.5.4 fixes critical XML-RPC issue (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=112015336720867&w=2
SuSE Security Announcement: SUSE-SA:2005:041 (Google Search)
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
SuSE Security Announcement: SUSE-SA:2005:049 (Google Search)
http://www.novell.com/linux/security/advisories/2005_49_php.html
SuSE Security Announcement: SUSE-SR:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_sr.html
BugTraq ID: 14088
http://www.securityfocus.com/bid/14088
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11294
http://www.vupen.com/english/advisories/2005/2827
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:350
http://securitytracker.com/id?1015336
http://secunia.com/advisories/15852
http://secunia.com/advisories/15872
http://secunia.com/advisories/15944
http://secunia.com/advisories/15947
http://secunia.com/advisories/15957
http://secunia.com/advisories/16001
http://secunia.com/advisories/18003
http://secunia.com/advisories/15810
http://secunia.com/advisories/15855
http://secunia.com/advisories/15861
http://secunia.com/advisories/15883
http://secunia.com/advisories/15884
http://secunia.com/advisories/15895
http://secunia.com/advisories/15903
http://secunia.com/advisories/15904
http://secunia.com/advisories/15916
http://secunia.com/advisories/15917
http://secunia.com/advisories/15922
http://secunia.com/advisories/16339
http://secunia.com/advisories/16693
http://secunia.com/advisories/17440
http://secunia.com/advisories/17674
Common Vulnerability Exposure (CVE) ID: CVE-2005-2106
Bugtraq: 20050629 [DRUPAL-SA-2005-002] Drupal 4.6.2 / 4.5.4 fixes input validation issue (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=112015287827452&w=2
BugTraq ID: 14110
http://www.securityfocus.com/bid/14110
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.