English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.814523
Category:Fedora Local Security Checks
Title:Fedora Update for drupal8 FEDORA-2018-7d748596e9
Summary:The remote host is missing an update for the 'drupal8'; package(s) announced via the FEDORA-2018-7d748596e9 advisory.
Description:Summary:
The remote host is missing an update for the 'drupal8'
package(s) announced via the FEDORA-2018-7d748596e9 advisory.

Vulnerability Insight:
Drupal is an open source content management platform powering millions of
websites and applications. Its built, used, and supported by an active and
diverse community of people around the world.


Affected Software/OS:
drupal8 on Fedora 28.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-7602
https://www.exploit-db.com/exploits/44542/
https://www.exploit-db.com/exploits/44557/
https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
Debian Security Information: DSA-4180 (Google Search)
https://www.debian.org/security/2018/dsa-4180
BugTraq ID: 103985
http://www.securityfocus.com/bid/103985
http://www.securitytracker.com/id/1040754
Common Vulnerability Exposure (CVE) ID: CVE-2018-9861
Common Vulnerability Exposure (CVE) ID: CVE-2018-7600
https://www.exploit-db.com/exploits/44448/
https://www.exploit-db.com/exploits/44449/
https://www.exploit-db.com/exploits/44482/
https://lists.debian.org/debian-lts-announce/2018/03/msg00028.html
https://blog.appsecco.com/remote-code-execution-with-drupal-core-sa-core-2018-002-95e6ecc0c714
https://github.com/a2u/CVE-2018-7600
https://github.com/g0rx/CVE-2018-7600-Drupal-RCE
https://greysec.net/showthread.php?tid=2912&pid=10561
https://research.checkpoint.com/uncovering-drupalgeddon-2/
https://twitter.com/RicterZ/status/979567469726613504
https://twitter.com/RicterZ/status/984495201354854401
https://twitter.com/arancaytar/status/979090719003627521
https://www.tenable.com/blog/critical-drupal-core-vulnerability-what-you-need-to-know
https://badpackets.net/over-100000-drupal-websites-vulnerable-to-drupalgeddon-2-cve-2018-7600/
Debian Security Information: DSA-4156 (Google Search)
https://www.debian.org/security/2018/dsa-4156
BugTraq ID: 103534
http://www.securityfocus.com/bid/103534
http://www.securitytracker.com/id/1040598
Common Vulnerability Exposure (CVE) ID: CVE-2017-6926
Common Vulnerability Exposure (CVE) ID: CVE-2017-6927
https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html
Debian Security Information: DSA-4123 (Google Search)
https://www.debian.org/security/2018/dsa-4123
BugTraq ID: 103138
http://www.securityfocus.com/bid/103138
Common Vulnerability Exposure (CVE) ID: CVE-2017-6930
Common Vulnerability Exposure (CVE) ID: CVE-2017-6931
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.