SA-CONTRIB-2014-018 - Webform - Cross Site Scripting (XSS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2014-018
  • Project: Webform (third-party module)
  • Version: 6.x, 7.x
  • Date: 2014-February-12
  • Security risk: Critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting

SA-CONTRIB-2014-017- Image Resize Filter - Denial of Service (DOS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2014-017
  • Project: Image Resize Filter (third-party module)
  • Version: 6.x, 7.x
  • Date: 2014-February-12
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Denial of Service (DOS)

SA-CONTRIB-2014-015 - FileField - Access Bypass

  • Advisory ID: DRUPAL-SA-CONTRIB-2014-015
  • Project: FileField (third-party module)
  • Version: 6.x
  • Date: 2014-02-12
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Access bypass

Access rules on a extra field [SOLVED]

I read that many people have a problem with "spam user registrations". I try to work on a solution but i have a little problem to implement it : ( Maybe some one can help me!

In my case: users who create an account are some of my clients, so my idea is:
I send an email to my client with the link to register and a keyword to insert in a extra field on the registration page.

The idea is to check that the extra field is similar to the one given (always the same). I check on the admin: User management -> Access rules page but i can't add a rule on an "custom" field

SA-CONTRIB-2014-014 - Webform Validation - Cross Site Scripting (XSS)

  • Advisory ID: DRUPAL-SA-CONTRIB-2014-014
  • Project: Webform Validation (third-party module)
  • Version: 6.x, 7.x
  • Date: 2014-February-12
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting

SA-CONTRIB-2014-013- Chaos tool suite (ctools) - Access Bypass

  • Advisory ID: DRUPAL-SA-CONTRIB-2014-013
  • Project: Chaos tool suite (ctools) (third-party module)
  • Version: 6.x, 7.x
  • Date: 2014-02-12
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Access bypass

Pages

Subscribe with RSS Subscribe to RSS - Drupal 6.x