Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Platform
Drupal Core
Drupal CMS
Drupal 11
Drupal AI
Solutions
Case studies
Fintech
Education
Retail
E-commerce
Healthcare
High Tech
Nonprofit
Government
Travel
Decoupled
Develop
Local Development Guide
Drupal user guide
Installing Drupal
API reference
All Documentation
Download
Download
Modules
Themes
Distributions
Issue queues
Get Support
Drupal CMS User Guide
Drupal user guide
Training
Drupal Slack
Find an Agency Partner
Find a Migration partner
Find Integrations & Hosting
Security Advisories
Connect
About the Community
Community Events
Jobs/Careers
DrupalCon
How to Contribute
Drupal in the News
Sign up for Drupal News
Support Drupal
The Drupal Association
Donate
Become a Partner
Become a Ripple Maker
Become an Organization Member
Drupal Swag Shop
Get Started
Try Drupal CMS
Try Hosting
Return to content
Search form
Search
Log in
Create account
DDEV is the official local development tool of Drupal. And like Drupal, DDEV depends on the support of the open source community.
Learn how to support DDEV
Security advisories
Show advisories for
only Drupal Core
,
only contributed projects
, or
only
PSAs
SA-CONTRIB-2013-096 - Entity reference - Access bypass
By
Drupal Security Team
on
20 Nov 2013 at 18:59 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-096
Project:
Entity reference
(third-party module)
Version: 7.x
Date: 2013-November-20
Security risk:
Not critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2013-095 - Organic Groups - Access bypass
By
Drupal Security Team
on
20 Nov 2013 at 18:30 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-095
Project:
Organic groups
(third-party module)
Version: 7.x
Date: 2013-November-20
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2013-094 - EU Cookie Compliance - Cross Site Scripting (XSS)
By
Drupal Security Team
on
20 Nov 2013 at 16:26 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-094
Project:
EU Cookie Compliance
(third-party module)
Version: 7.x
Date: 2013-November-20
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2013-093 - Invitation - Access Bypass
By
Drupal Security Team
on
20 Nov 2013 at 15:53 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-093
Project:
Invitation
(third-party module)
Version: 7.x
Date: 2013-November-20
Security risk:
Critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2013-092 - Misery - Denial of Service (DOS) vulnerability.
By
Drupal Security Team
on
13 Nov 2013 at 19:53 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-092
Project:
Misery
(third-party module)
Version: 6.x, 7.x
Date: 2013-November-13
Security risk:
Not critical
Exploitable from: Remote
Vulnerability: Multiple vulnerabilities
SA-CONTRIB-2013-091 - Groups, Communities and Co (GCC) - Access Bypass
By
Drupal Security Team
on
13 Nov 2013 at 19:47 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-091
Project:
Groups, Communities and Co (GCC)
(third-party module)
Version: 7.x
Date: 2013-November-13
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2013-090 - Revisioning - Access Bypass
By
Drupal Security Team
on
13 Nov 2013 at 19:40 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-090
Project:
Revisioning
(third-party module)
Version: 7.x
Date: 2013-November-13
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2013-089 - Node Access Keys - Access Bypass
By
Drupal Security Team
on
6 Nov 2013 at 19:55 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-089
Project:
Node Access Keys
(third-party module)
Version: 7.x
Date: 2013-November-06
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2013-088 - Secure Pages - Missing Encryption of Sensitive Data
By
Drupal Security Team
on
6 Nov 2013 at 19:46 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-088
Project:
Secure Pages
(third-party module)
Version: 6.x
Date: 2013-November-06
Security risk:
Less critical
Exploitable from: Remote
Vulnerability: Missing Encryption of Sensitive Data
SA-CONTRIB-2013-087 - Payment for Webform - Access Bypass
By
Drupal Security Team
on
6 Nov 2013 at 19:33 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2013-087
Project:
Payment for Webform
(third-party module)
Version: 7.x
Date: 2013-November-06
Security risk:
Not critical
Exploitable from: Remote
Vulnerability: Access bypass
Pages
« first
‹ previous
…
111
112
113
114
115
116
117
118
119
…
next ›
last »
Subscribe with RSS