Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-5652
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-03 Jan, 2013 | 01:55
Updated At-11 Apr, 2025 | 00:51

Drupal 6.x before 6.27 allows remote attackers to obtain sensitive information about uploaded files via a (1) RSS feed or (2) search result.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.0
cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.1
cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.2
cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.3
cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.4
cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.5
cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.6
cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.7
cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.8
cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.9
cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.10
cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.11
cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.12
cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.13
cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.14
cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.15
cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.16
cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.17
cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.18
cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.19
cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.20
cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.21
cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.22
cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.23
cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.24
cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.25
cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
The Drupal Association
drupal
>>drupal>>6.26
cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://drupal.org/SA-CORE-2012-004secalert@redhat.com
Patch
Vendor Advisory
http://drupalcode.org/project/drupal.git/commitdiff/da8023asecalert@redhat.com
Patch
http://osvdb.org/88527secalert@redhat.com
N/A
http://secunia.com/advisories/51517secalert@redhat.com
Vendor Advisory
http://www.debian.org/security/2013/dsa-2776secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2012/12/20/1secalert@redhat.com
N/A
http://www.securityfocus.com/bid/56993secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/80794secalert@redhat.com
N/A
http://drupal.org/SA-CORE-2012-004af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://drupalcode.org/project/drupal.git/commitdiff/da8023aaf854a3a-2127-422b-91ae-364da2661108
Patch
http://osvdb.org/88527af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/51517af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2013/dsa-2776af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2012/12/20/1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/56993af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/80794af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found