News

Drupal, which is currently the fourth most used CMS on the internet after WordPress, Shopify, and Joomla, gave the vulnerability a rating of "Critical," advising site owners to patch as soon as ...
But thousands of servers remain unpatched and vulnerable to the flaw ... he found mining code running on NHS England's website, which runs the Drupal platform. Troy Mursch, who runs the Bad ...
According to the company, “automated attacks” started to hit websites running Drupal version 7 within a matter of hours of it disclosing a highly critical SQL injection vulnerability on October 15th.
Drupal issued a security advisory of four critical vulnerabilities rated from moderately critical to critical. The vulnerabilities affect Drupal versions 9.3 and 9.4. The security advisory warned ...
“Systematic attacks were launched against a wide variety of Drupal websites in an attempt to exploit this vulnerability,” the group stated in its update. “If you did not update your site ...
Attackers are mass-exploiting a recently fixed vulnerability in the Drupal content management system that allows them to take complete control of powerful website servers, researchers from ...
Drupalgeddon 2.0 “potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised,” according to MITRE’s Common ...
What this means, according to the team, is that the attacker could access, delete and modify any non-public data on the vulnerable website powered by Drupal. No privileges or login credentials are ...
Exploiting the vulnerability does not require authentication and can lead to a complete website compromise. The reason why Drupal’s security team came out with a stronger warning and additional ...
Drupal admins should ensure that ... In the security section of the CMS website, the developers list seven software vulnerabilities that were closed in April. They classify two vulnerabilities ...