SA-CONTRIB-2013-048 - Edit Limit - Access Bypass

  • Advisory ID: DRUPAL-SA-CONTRIB-2013-048
  • Project: Edit Limit (third-party module)
  • Version: 7.x
  • Date: 2013-May-29
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Access bypass

SA-CONTRIB-2013-047 - Google Authenticator login - Access Bypass

SA-CONTRIB-2013-046 - Filebrowser - Reflected Cross Site Scripting (XSS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2013-046
  • Project: Filebrowser (third-party module)
  • Version: 6.x
  • Date: 2013-May-1
  • Security risk: Highly critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting

SA-CONTRIB-2013-045 - Autocomplete Widgets for Text and Number Fields (autocomplete_widgets) - Access bypass

SA-CONTRIB-2013-044 - elFinder file manager - Cross Site Request Forgery (CSRF)

  • Advisory ID: DRUPAL-SA-CONTRIB-2013-044
  • Project: elFinder file manager (third-party module)
  • Version: 6.x, 7.x
  • Date: 2013-April-17
  • Security risk: Highly critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Request Forgery

SA-CONTRIB-2013-043 - MP3 Player - Cross Site Scripting (XSS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2013-043
  • Project: MP3 Player (third-party module)
  • Version: 6.x
  • Date: 2013-April-17
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting

SA-CONTRIB-2013-042 - RESTful Web Services (RESTWS) - Denial of Service

  • Advisory ID: DRUPAL-SA-CONTRIB-2013-042
  • Project: RESTful Web Services (third-party module)
  • Version: 7.x
  • Date: 2013-April-10
  • Security risk: Critical
  • Exploitable from: Remote
  • Vulnerability: Denial of Service

SA-CONTRIB-2013-041 - Chaos tool suite (ctools) - Access bypass

SA-CONTRIB-2013-040 - Commerce Skrill (Formerly Moneybookers) - Access bypass

SA-CONTRIB-2013-039 - Commons Wikis - Access bypass & Privilege escalation

  • Advisory ID: DRUPAL-SA-CONTRIB-2013-039
  • Project: Commons Wikis (third-party module)
  • Version: 7.x
  • Date: 2013-March-27
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Access bypass, Multiple vulnerabilities

Pages

Subscribe with RSS Subscribe to Security advisories