Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Discover Drupal
Drupal Core
Drupal CMS
Drupal AI
Case Studies
Drupal for Government
Drupal for Higher Education
Drupal for Nonprofit
Drupal for eCommerce
Drupal for FinTech
Drupal for Healthcare
Drupal for Enterprise
Drupal for Retail
Drupal for Travel & Tourism
Build with Drupal
Download Drupal
Documentation
Getting started
Local Development Guide
Developer Resources
Drupal CMS User Guide
Drupal User Guide
API
Modules
Themes
Recipes
Site Templates
Issue queues
Security Advisories
Partners & Services
Find a Drupal Certified Partner
Become a Drupal Certified Partner
Find a Hosting Provider
Find a Migration Partner
Find Training
Drupal Steward
Community
About the Community
How to Contribute
DrupalCon
Events
Jobs / Careers
News & Blogs
Forum
Slack
Newsletters
Drupal Swag Shop
Support Drupal
The Drupal Association
Donate
Become a Partner
Become a Ripple Maker
Become an Organization Member
Drupal Swag Shop
Get Started
Try Drupal CMS
Try Hosting
Return to content
Search form
Search
Log in
Create account
Security advisories
Show advisories for
only Drupal Core
,
only contributed projects
, or
only
PSAs
SA-CONTRIB-2012-171 - Webmail Plus - SQL injection - (unsupported)
By
Drupal Security Team
on
28 Nov 2012 at 20:34 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-171
Project:
Webmail Plus
(third-party module)
Version: 6.x
Date: 2012-November-28
Security risk:
Critical
Exploitable from: Remote
Vulnerability: SQL Injection
SA-CONTRIB-2012-170 - MultiLink - Access Bypass
By
Drupal Security Team
on
28 Nov 2012 at 20:10 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-170
Project:
Multi-Language Link and Redirect (MultiLink)
(third-party module)
Version: 6.x, 7.x
Date: 2012-November-28
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2012-169 - Email Field - Cross Site Scripting and Access bypass
By
Drupal Security Team
on
28 Nov 2012 at 19:47 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-169
Project:
Email Field
(third-party module)
Version: 6.x
Date: 2012-11-28
Security risk:
Less critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting, Access bypass
SA-CONTRIB-2012-168 - Services - Information Disclosure
By
Drupal Security Team
on
28 Nov 2012 at 19:26 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-168
Project:
Services
(third-party module)
Version: 6.x, 7.x
Date: 2012-11-28
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Information Disclosure
SA-CONTRIB-2012-167 - Mixpanel - Cross site scripting (XSS)
By
Drupal Security Team
on
28 Nov 2012 at 19:26 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-167
Project:
Mixpanel
(third-party module)
Version: 6.x
Date: 2012-November-28
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2012-166 - Table of Contents - Access Bypass
By
Drupal Security Team
on
14 Nov 2012 at 21:14 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-166
Project:
Table of Contents
(third-party module)
Version: 6.x
Date: 2012-November-14
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2012-165 - Chaos tool suite (ctools) - Cross Site Scripting (XSS)
By
Drupal Security Team
on
14 Nov 2012 at 20:44 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-165
Project:
Chaos tool suite (ctools)
(third-party module)
Version: 6.x
Date: 2012-November-14
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2012-164 - Smiley module and Smileys module - Cross Site Scripting (XSS)
By
Drupal Security Team
on
14 Nov 2012 at 19:06 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-164
Project:
Smiley
(third-party module)
Project:
Smileys
(third-party module)
Version: 6.x
Date: 2012-November-14
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2012-163 - User Read-Only - Permission escalation
By
Drupal Security Team
on
14 Nov 2012 at 19:03 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-163
Project:
User Read-Only
(third-party module)
Version: 6.x, 7.x
Date: 2012-November-14
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2012-162 - RESTful Web Services - Cross site request forgery (CSRF)
By
Drupal Security Team
on
14 Nov 2012 at 16:55 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2012-162
Project:
RESTful Web Services
(third-party module)
Version: 7.x
Date: 2012-November-14
Security risk:
Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Request Forgery
Pages
« first
‹ previous
…
129
130
131
132
133
134
135
136
137
…
next ›
last »
Subscribe with RSS