Show advisories for only Drupal core, only PSAs, or all security advisories

Security advisories for third-party projects that are not part of Drupal core - this includes all modules, themes, and installation profiles that have been contributed by community members.

SA-CONTRIB-2012-099 - Node Hierarchy - Cross Site Request Forgery (CSRF)

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-099
  • Project: Node Hierarchy (third-party module)
  • Version: 6.x
  • Date: 2012-June-13
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Request Forgery

SA-CONTRIB-2012-098 - Janrain Capture - Open Redirect

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-098
  • Project: Janrain Capture (third-party module)
  • Version: 6.x, 7.x
  • Date: 2012-June-13
  • Security risk: Less critical
  • Exploitable from: Remote
  • Vulnerability: Open Redirect

SA-CONTRIB-2012-097 - Protest - Cross Site Scripting (XSS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-097
  • Project: Protest (third-party module)
  • Version: 6.x, 7.x
  • Date: 2012-June-06
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting

SA-CONTRIB-2012-096 - Authoring HTML - Cross Site Scripting (XSS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-096
  • Project: Authoring HTML (third-party module)
  • Version: 6.x
  • Date: 2012-June-06
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting

SA-CONTRIB-2012-095 - Simplenews - Information Disclosure

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-095
  • Project: Simplenews (third-party module)
  • Version: 6.x, 7.x
  • Date: 2012-June-06
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Information Disclosure

SA-CONTRIB-2012-094 - Maestro module - Cross Site Request Forgery (CSRF), Cross Site Scripting (XSS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-094
  • Project: Maestro (third-party module)
  • Version: 7.x
  • Date: 2012-June-06
  • Security risk: Critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting, Cross Site Request Forgery

SA-CONTRIB-2012-093 - Node Embed - Access Bypass

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-093
  • Project: Node Embed (third-party module)
  • Version: 6.x, 7.x
  • Date: 2012-June-06
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Access bypass

SA-CONTRIB-2012-092 - Organic Groups - Cross Site Scripting (XSS) and Access Bypass

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-092
  • Project: Organic groups (third-party module)
  • Version: 6.x
  • Date: 2012-June-06
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting, Access bypass

SA-CONTRIB-2012-091 - Token Authentication - Access bypass

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-091
  • Project: Tokenauth (third-party module)
  • Version: 6.x
  • Date: 2012-June-06
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Access bypass

SA-CONTRIB-2012-090 - File depot - Session Management Vulnerability

  • Advisory ID: DRUPAL-SA-CONTRIB-2012-090
  • Project: filedepot (third-party module)
  • Version: 6.x
  • Date: 2012-May-30
  • Security risk: Critical
  • Exploitable from: remote
  • Vulnerability: Access bypass

Pages

Subscribe with RSS Subscribe to Security advisories for contributed projects