[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-16784":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":45},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":42,"name":43,"published":44,"updated":27},16784,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":34,"epss_score":35,"epss_percentile":36,"cve":37,"in_cisa_catalog":41,"date":27,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"high","The following flaws exist: - An improper validation of JSON-encoded content in system module. - The XML-RPC system allows a large number of calls to the same method. - An error in user_save function in User module. Successful exploitation will allow remote attackers to cause brute force attacks, to download and execute JSON-encoded content and also to gain elevated privileges.","Drupal is prone to multiple vulnerabilities.","Upgrade to version 6.38 or 7.43 or later.",[33],"https://www.drupal.org/SA-CORE-2016-001",8.1,0.01016,0.7714,[38,39,40],"CVE-2016-3168","CVE-2016-3163","CVE-2016-3169",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.808044","Drupal 6.x \u003C 6.38, 7.x \u003C 7.43 Multiple Vulnerabilities (SA-CORE-2016-001) - Windows","2018-01-02T00:00:00Z",["Island",46],{"key":47,"params":48,"result":50},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":49},"{\"text-color\":\"gray\"}",{"head":51},{}]