First published: Wed Jun 27 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the Search API module 7.x-1.x before 7.x-1.1 for Drupal, when supporting manual entry of field identifiers, allow remote attackers to inject arbitrary web script or HTML via vectors related to thrown exceptions and logging errors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thomas Seidl Search Api | =7.x-1.0 | |
Thomas Seidl Search Api | =7.x-1.0-beta1 | |
Thomas Seidl Search Api | =7.x-1.0-beta10 | |
Thomas Seidl Search Api | =7.x-1.0-beta2 | |
Thomas Seidl Search Api | =7.x-1.0-beta3 | |
Thomas Seidl Search Api | =7.x-1.0-beta4 | |
Thomas Seidl Search Api | =7.x-1.0-beta5 | |
Thomas Seidl Search Api | =7.x-1.0-beta6 | |
Thomas Seidl Search Api | =7.x-1.0-beta7 | |
Thomas Seidl Search Api | =7.x-1.0-beta8 | |
Thomas Seidl Search Api | =7.x-1.0-beta9 | |
Thomas Seidl Search Api | =7.x-1.0-rc1 | |
Thomas Seidl Search Api | =7.x-1.x-dev | |
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.