U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2014-3704

Change History

Modified Analysis by NIST 9/29/2021 10:08:04 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:drupal:drupal_core:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.01:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.02:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.03:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.04:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.05:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.06:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.07:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.08:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.09:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.10:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.11:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.12:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.13:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.14:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.15:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.16:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.17:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.18:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.19:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.20:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.21:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.22:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.23:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.24:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.25:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.26:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.27:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.28:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.29:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.30:*:*:*:*:*:*:*
     *cpe:2.3:a:drupal:drupal_core:7.31:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* versions from (including) 7.0 up to (excluding) 7.32
Changed Reference Type
http://osvdb.org/show/osvdb/113371 No Types Assigned
http://osvdb.org/show/osvdb/113371 Broken Link
Changed Reference Type
http://packetstormsecurity.com/files/128720/Drupal-7.X-SQL-Injection.html Exploit
http://packetstormsecurity.com/files/128720/Drupal-7.X-SQL-Injection.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://packetstormsecurity.com/files/128721/Drupal-7.31-SQL-Injection.html Exploit
http://packetstormsecurity.com/files/128721/Drupal-7.31-SQL-Injection.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://packetstormsecurity.com/files/128741/Drupal-HTTP-Parameter-Key-Value-SQL-Injection.html Exploit
http://packetstormsecurity.com/files/128741/Drupal-HTTP-Parameter-Key-Value-SQL-Injection.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://seclists.org/fulldisclosure/2014/Oct/75 No Types Assigned
http://seclists.org/fulldisclosure/2014/Oct/75 Exploit, Mailing List, Patch, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/59972 No Types Assigned
http://secunia.com/advisories/59972 Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2014/dsa-3051 No Types Assigned
http://www.debian.org/security/2014/dsa-3051 Third Party Advisory
Changed Reference Type
http://www.exploit-db.com/exploits/34984 Exploit
http://www.exploit-db.com/exploits/34984 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.exploit-db.com/exploits/34992 Exploit
http://www.exploit-db.com/exploits/34992 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.exploit-db.com/exploits/34993 Exploit
http://www.exploit-db.com/exploits/34993 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.exploit-db.com/exploits/35150 Exploit
http://www.exploit-db.com/exploits/35150 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.openwall.com/lists/oss-security/2014/10/15/23 Exploit
http://www.openwall.com/lists/oss-security/2014/10/15/23 Exploit, Mailing List, Patch
Changed Reference Type
http://www.securityfocus.com/archive/1/533706/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/533706/100/0/threaded Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/70595 No Types Assigned
http://www.securityfocus.com/bid/70595 Third Party Advisory, VDB Entry
Changed Reference Type
https://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html Exploit
https://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html Exploit, Patch, Third Party Advisory
Changed Reference Type
https://www.sektioneins.de/en/blog/14-11-03-drupal-sql-injection-vulnerability-PoC.html No Types Assigned
https://www.sektioneins.de/en/blog/14-11-03-drupal-sql-injection-vulnerability-PoC.html Exploit, Third Party Advisory