glossify 6.x-3.0-beta2

Security update
Bug fixes
Insecure

- Implemented suggestion from: http://drupal.org/node/761524
- Fixed issue: http://drupal.org/node/885618
- Security fix for the themed output.
- Updated the README.txt
- Other minor fixes.

simplenews_content_selection 6.x-1.6

Security update
New features
Bug fixes

- Leaving the ajax for scs_views behind
- Added possibility for default title
- Coding standards
- New theme functions
- Updated INSTALL.txt
- Theming for node output is now in front-end theme
- Bugfixes

Contains a fix for SA-CONTRIB-2010-089 - Simplenews Content Selection - Cross Site Scripting.

cck 6.x-2.8

Security update
Insecure

Fixes for content_access() and nodereference_autocomplete_access() described in SA-CONTRIB-2010-088.

govdelivery 6.x-1.1

Security update

SA-CONTRIB-2010-087 - GovDelivery - Cross site scripting
The GovDelivery module provides integration with the GovDelivery On-Demand Mailer service, a web service for GovDelivery customers that sends messages directly based on configured account information. The module replaces the backend of SMTP library in your Drupal site with calls to the GovDelivery service, so all mail sent from your site uses the ODM service.
The module does not sanitize some of the user-supplied data before displaying it (for Drupal 6.x-1.0 only), leading to a Cross Site Scripting (XSS).

prepopulate 5.x-1.5

Security update

SA-CONTRIB-2010-086 - Prepopulate - Access Bypass

The Prepopulate module provides the ability for form fields to be pre-populated via the request sent for the form.

The module is vulnerable to access bypass which would allow a malicious user to change the value of fields they would not otherwise have access to alter.

See http://drupal.org/node/880696 for more information.

prepopulate 6.x-2.0

Security update
Insecure

Advisory ID: DRUPAL-SA-CONTRIB-2010-086 - PREPOPULATE ACCESS BYPASS

The Prepopulate module provides the ability for form fields to be pre-populated via the request sent for the form.

The module is vulnerable to access bypass which would allow a malicious user to change the value of fields they would not otherwise have access to alter.

For more information see the Security Advisory at http://drupal.org/node/880696

Pages

Subscribe with RSS Subscribe to RSS - Security update