Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Discover Drupal
Drupal Core
Drupal CMS
Drupal AI
Case Studies
Drupal for Government
Drupal for Higher Education
Drupal for Nonprofit
Drupal for eCommerce
Drupal for FinTech
Drupal for Healthcare
Drupal for Media & Publishing
Build with Drupal
Download Drupal
Documentation
Getting started
Local Development Guide
Developer Resources
Drupal CMS User Guide
Drupal User Guide
API
Modules
Themes
Distributions
Issue queues
Security Advisories
Partners & Services
Find a Drupal Certified Partner
Become a Drupal Certified Partner
Find a Hosting Provider
Find a Migration Partner
Find Training
Drupal Steward
Community
About the Community
How to Contribute
DrupalCon
Events
Jobs / Careers
News & Blogs
Forum
Slack
Newsletters
Drupal Swag Shop
Support Drupal
The Drupal Association
Donate
Become a Partner
Become a Ripple Maker
Become an Organization Member
Drupal Swag Shop
Get Started
Try Drupal CMS
Try Hosting
Return to content
Search form
Search
Log in
Create account
Still on Drupal 7? Security support for Drupal 7 ended on 5 January 2025. Please visit our Drupal 7 End of Life resources page to review all of your options.
Migration Resource Center
Security advisories
Show advisories for
only Drupal Core
,
only contributed projects
, or
only
PSAs
Print - Access bypass
By
AjK
on
9 Jul 2007 at 21:46 UTC
Advisory ID: DRUPAL-SA-2007-014
Project: Print (third-party module)
Version: 5.x and 4.7.x
Date: 2007-July-09
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Access bypass
Multiple vulnerabilities in Database Administration (dba) module
By
dww
on
11 Apr 2007 at 22:05 UTC
Advisory ID: DRUPAL-SA-2007-013.
Project: Database Administration (third-party module).
Version: 4.6.x-1.*, 4.7.x-1.*.
Date: 2007-April-11.
Security risk: Critical.
Exploitable from: Remote.
Vulnerability: Cross site scripting and cross site request forgery.
Project issue tracking - Access bypass
By
dww
on
8 Mar 2007 at 08:00 UTC
Advisory ID: DRUPAL-SA-2007-012.
Project: Project issue tracking (third-party module).
Version: 4.7.x-1.*, 4.7.x-2.*, 5.x-0.*.
Date: 2007-March-08.
Security risk: Critical.
Exploitable from: Remote.
Vulnerability: Access bypass.
Nodefamily - Access bypass
By
heine
on
6 Mar 2007 at 20:25 UTC
Advisory ID: DRUPAL-SA-2007-011
Project: Node familty (third-party module)
Version: 5.x
Date: 2007-March-6
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Access bypass
Secure site - Access bypass
By
heine
on
16 Feb 2007 at 03:12 UTC
Advisory ID: DRUPAL-SA-2007-010
Project: Secure site (third-party module)
Version: 4.7, 5
Date: 2007-Feb-16
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Access bypass
getID3 library and Audio, Mediafield - arbitrary code execution
By
heine
on
16 Feb 2007 at 01:21 UTC
Advisory ID: DRUPAL-SA-2007-009.
Project: getID3 (third-party library) used by Audio and Mediafield
Version: getID3 1.7.1
Date: 2007-Feb-16
Security risk: Highly critical
Exploitable from: Remote
Vulnerability: Arbitrary code execution
Image pager - Cross site scripting
By
heine
on
15 Feb 2007 at 09:24 UTC
Advisory ID: DRUPAL-SA-2007-008
Project: Image Pager (third-party module)
Version: 4.7.x-1.x-dev, 5.x-1.x-dev
Date: 2007-02-15
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Cross site scripting
Textimage - response validation bypass
By
heine
on
31 Jan 2007 at 09:59 UTC
Advisory ID: DRUPAL-SA-2007-007
Project: Textimage (third-party module)
Version: 4.7.x, 5.x
Date: 2007-Jan-31
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Captcha bypass
Captcha - response validation bypass
By
heine
on
30 Jan 2007 at 21:43 UTC
Advisory ID: DRUPAL-SA-2007-006
Project: Captcha (third-party module)
Version: 4.7.x, 5.x
Date: 2007-Jan-30
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Captcha bypass
DRUPAL-SA-2007-005 - Drupal core - Arbitrary code execution
By
heine
on
29 Jan 2007 at 19:11 UTC
Advisory ID: DRUPAL-SA-2007-005
Project: Drupal core
Version: 4.7.x, 5.x
Date: 2007-Jan-29
Security risk: Highly critical
Exploitable from: Remote
Vulnerability: Arbitrary code execution
Pages
« first
‹ previous
…
181
182
183
184
185
186
187
188
189
next ›
last »
Subscribe with RSS