From d9efe26e63446b7d24f23abc93eaa4a32d55a460 Mon Sep 17 00:00:00 2001 From: Jochen Neumeister Date: Wed, 1 Jul 2020 08:50:56 +0000 Subject: [PATCH] Add entry for Drupal 7 Sponsored by: Netzkommune GmbH --- security/vuxml/vuln.xml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f156340ef308..665f53b58471 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,32 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + drupal -- Multiple Vulnerabilities + + + drupal7 + 7.72 + + + + +

Drupal Security Team reports:

+
+

The Drupal core Form API does not properly handle certain form input + from cross-site requests, which can lead to other vulnerabilities.

+
+ +
+ + https://www.drupal.org/sa-core-2020-004 + + + 2020-06-17 + 2020-07-01 + +
+ xrdp -- Local users can perform a buffer overflow attack against the xrdp-sesman service and then inpersonate it