Summary
Detail | |||
---|---|---|---|
Vendor | Flag Module Project | First view | 2014-05-17 |
Product | Flag | Last view | 2014-05-17 |
Version | 7.x-3.0 | Type | Application |
Update | - | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | drupal | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:flag_module_project:flag |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2014-05-17 | CVE-2014-3453 | Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import. NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2015-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2015-0072.nasl - Type: ACT_GATHER_INFO |
2015-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2015-0078.nasl - Type: ACT_GATHER_INFO |