Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Platform
Drupal Core
Drupal CMS
Drupal 11
Drupal AI
Solutions
Case studies
Fintech
Education
Retail
E-commerce
Healthcare
High Tech
Nonprofit
Government
Travel
Decoupled
Develop
Local Development Guide
Drupal user guide
Installing Drupal
API reference
All Documentation
Download
Download
Modules
Themes
Distributions
Issue queues
Get Support
Drupal CMS User Guide
Drupal user guide
Training
Drupal Slack
Find an Agency Partner
Find a Migration partner
Find Integrations & Hosting
Security Advisories
Connect
About the Community
Community Events
Jobs/Careers
DrupalCon
How to Contribute
Drupal in the News
Sign up for Drupal News
Support Drupal
The Drupal Association
Donate
Become a Partner
Become a Ripple Maker
Become an Organization Member
Drupal Swag Shop
Get Started
Try Drupal CMS
Try Hosting
Return to content
Search form
Search
Log in
Create account
DDEV is the official local development tool of Drupal. And like Drupal, DDEV depends on the support of the open source community.
Learn how to support DDEV
Security advisories
Show advisories for
only Drupal Core
,
only contributed projects
, or
only
PSAs
SA-CONTRIB-2012-116 - Subuser - Cross Site Request Forgery (CSRF) and Access Bypass
By
Drupal Security Team
on
25 Jul 2012 at 19:42 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-116
Project:
Subuser
(third-party module)
Version: 6.x
Date: 2012-July-25
Security risk:
Less critical
Exploitable from: Remote
Vulnerability: Access bypass, Cross Site Request Forgery
SA-CONTRIB-2012-115 - Gallery formatter - Cross Site Scripting (XSS)
By
Drupal Security Team
on
25 Jul 2012 at 19:39 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-115
Project:
Gallery formatter
(third-party module)
Version: 7.x
Date: 2012-July-25
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2012-114 - Campaign Monitor - Cross Site Scripting (XSS)
By
Drupal Security Team
on
18 Jul 2012 at 15:25 UTC
Advisory ID: SA-CONTRIB-2012-114
Project:
Campaign Monitor
(third-party module)
Version: 6.x
Date: 2012-July-18
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2012-113 - Drupal Commons - Access Bypass
By
Drupal Security Team
on
11 Jul 2012 at 21:53 UTC
Advisory ID: SA-CONTRIB-2012-113
Project:
Drupal Commons
(third-party module)
Version: 6.x
Date: 2012-July-11
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2012-112 - Ubercart SecureTrading - Failure to follow guideline/specification
By
Drupal Security Team
on
11 Jul 2012 at 20:40 UTC
Advisory ID: SA-CONTRIB-2012-112
Project:
Ubercart SecureTrading Payment Method
(third-party module)
Version: 6.x
Date: 2012-July-11
Security risk:
Highly critical
Exploitable from: Remote
Vulnerability: Failure to follow guideline/specification - integrity check value
SA-CONTRIB-2012-111 - Security Questions - Access Bypass
By
Drupal Security Team
on
11 Jul 2012 at 15:59 UTC
Advisory ID: SA-CONTRIB-2012-111
Project:
Security Questions
(third-party module)
Version: 6.x, 7.x
Date: 2012-July-11
Security risk:
Highly critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2012-110 - Colorbox Node - Cross Site Scripting (XSS)
By
Drupal Security Team
on
11 Jul 2012 at 15:18 UTC
Advisory ID: SA-CONTRIB-2012-110
Project:
Colorbox Node
(third-party module)
Version: 7.x
Date: 2012-July-11
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2012-109 - Restrict node page view - Access bypass
By
Drupal Security Team
on
11 Jul 2012 at 15:06 UTC
Advisory ID: SA-CONTRIB-2012-109
Project:
Restrict node page view
(third-party module)
Version: 7.x
Date: 2012-July-11
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2012-108 - Drag & Drop Gallery - Arbitrary PHP code execution
By
Drupal Security Team
on
11 Jul 2012 at 14:50 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-108
Project:
Drag & Drop Gallery
(third-party module)
Version: 6.x
Date: 2012-July-11
Security risk:
Highly critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting, Access bypass, Cross Site Request Forgery, SQL Injection, Arbitrary PHP code execution
SA-CONTRIB-2012-107 - Search autocomplete - Access bypass
By
Drupal Security Team
on
11 Jul 2012 at 14:34 UTC
Advisory ID: SA-CONTRIB-2012-107
Project:
Search Autocomplete
(third-party module)
Version: 7.x
Date: 2012-July-11
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
Pages
« first
‹ previous
…
127
128
129
130
131
132
133
134
135
…
next ›
last »
Subscribe with RSS