Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Discover Drupal
Drupal Core
Drupal CMS
Drupal AI
Case Studies
Drupal for Government
Drupal for Higher Education
Drupal for Nonprofit
Drupal for eCommerce
Drupal for FinTech
Drupal for Healthcare
Drupal for Media & Publishing
Build with Drupal
Download Drupal
Documentation
Getting started
Local Development Guide
Developer Resources
Drupal CMS User Guide
Drupal User Guide
API
Modules
Themes
Distributions
Issue queues
Security Advisories
Partners & Services
Find a Drupal Certified Partner
Become a Drupal Certified Partner
Find a Hosting Provider
Find a Migration Partner
Find Training
Drupal Steward
Community
About the Community
How to Contribute
DrupalCon
Events
Jobs / Careers
News & Blogs
Forum
Slack
Newsletters
Drupal Swag Shop
Support Drupal
The Drupal Association
Donate
Become a Partner
Become a Ripple Maker
Become an Organization Member
Drupal Swag Shop
Get Started
Try Drupal CMS
Try Hosting
Return to content
Search form
Search
Log in
Create account
Not attending DrupalCon Vienna 2025? We would love to hear why. Your feedback helps us understand the community better.
Please complete the short survey here
Security advisories
Show advisories for
only Drupal Core
,
only contributed projects
, or
only
PSAs
SA-2008-065 - Node Clone - Access bypass
By
pwolanin
on
15 Oct 2008 at 18:27 UTC
Advisory ID: DRUPAL-SA-2008-065
Project: Node Clone (third-party module)
Version: 6.x, and 5.x.
Date: 2008-October-15
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-2008-064 - Node Vote - SQL injection vulnerability
By
kbahey
on
15 Oct 2008 at 16:46 UTC
Advisory ID: DRUPAL-SA-2008-064
Project: Node Vote (third-party module)
Versions: 5.x and 6.x
Date: 2008-October-15
Security risk: Critical
Exploitable from: Remote
Vulnerability: SQL injection
SA-2008-063 - multiple third party modules - Access bypass due to incorrect Drupal 6 updates
By
pwolanin
on
9 Oct 2008 at 19:41 UTC
Advisory ID: DRUPAL-SA-2008-063
Project: Several Third-Party Modules incorrectly updated for the Drupal 6 menu system
Version: 6.x
Date: 2008-October-8
Security risk: Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-2008-062 - SIOC - access bypass
By
Amazon
on
8 Oct 2008 at 21:47 UTC
Advisory ID: DRUPAL-SA-2008-062
Project: SIOC (third-party module)
Versions: 5.x and 6.x
Date: 2008-October-08
Security risk: Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-2008-061 - Everyblog - Multiple vulnerabilities
By
Amazon
on
8 Oct 2008 at 21:45 UTC
Advisory ID: DRUPAL-SA-2008-061
Project: EveryBlog (third-party module)
Versions: 5.x and 6.x
Date: 2008-October-08
Security risk: Highly critical
Exploitable from: Remote
Vulnerability:SQL injection, Cross-site scripting (XSS), Privilege escalation, access bypass
SA-2008-060 - Drupal core - Multiple vulnerabilities
By
gábor hojtsy
on
8 Oct 2008 at 21:43 UTC
Advisory ID: DRUPAL-SA-2008-060
Project: Drupal core
Versions: 5.x and 6.x
Date: 2008-October-8
Security risk: Critical
Exploitable from: Remote
Vulnerability: Multiple vulnerabilities
SA-2008-059 - Brilliant Gallery - SQL Injection and Cross Site Scripting
By
kbahey
on
1 Oct 2008 at 20:24 UTC
Advisory ID: DRUPAL-SA-2008-059
Project: Brilliant Gallery (third-party module)
Versions: 5.x
Date: 2008-October-1
Security risk: Critical
Exploitable from: Remote
Vulnerability: SQL injection and Cross Site Scripting
SA-2008-058 - Brilliant Gallery - SQL Injection
By
heine
on
24 Sep 2008 at 22:42 UTC
Advisory ID: DRUPAL-SA-2008-058
Project: Brilliant Gallery (third-party module)
Versions: 5.x, 6.x
Date: 2008-September-25
Security risk: Critical
Exploitable from: Remote
Vulnerability: SQL injection
SA-2008-057 - Ajax Checklist - Multiple vulnerabilities
By
heine
on
24 Sep 2008 at 19:48 UTC
Advisory ID: DRUPAL-SA-2008-057
Project: Ajax Checklist (third-party module)
Versions: 5.x
Date: 2008-September-24
Security risk: Critical
Exploitable from: Remote
Vulnerability: SQL injection, Cross site scripting
SA-2008-056 - Simplenews - Cross site scripting
By
heine
on
24 Sep 2008 at 18:58 UTC
Advisory ID: DRUPAL-SA-2008-056
Project: Simplenews (third-party module)
Versions: 5.x, 6.x
Date: 2008-September-24
Security risk: Not Critical
Exploitable from: Remote
Vulnerability: Cross site scripting
Pages
« first
‹ previous
…
172
173
174
175
176
177
178
179
180
…
next ›
last »
Subscribe with RSS