Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Why Drupal?
About Drupal
Platform overview
Drupal 10
Content Authoring
Content as a Service
Decoupled
Accessibility
Marketing Automation
Multilingual
Security
Personalization
Case studies
Video series
News
Use cases
For Developers
For Marketers
E-commerce
Education
FinTech
Government
Healthcare
High Tech
Nonprofit
Retail
Travel
Resources
Installing Drupal
Documentation
User guide
Local Development Guide
Security
News
Blog
Drupal 7 Migrations
Services
Find an Agency Partner
Find a D7 Migration Partner
Find Integrations & Hosting
Find Drupal Training
Become a Certified Partner
Community
How to Contribute
About the Community
Support
Community Governance
Jobs/Careers
Events
DrupalCon Portland 2024
DrupalCon Barcelona 2024
Community Events
Download
Download
Modules
Themes
Distributions
Issue queues
Browse Repository
Give
Drupal Association
Become an Organization Member
Become a Certified Partner
Become an Individual Member
Make a Donation
Discover Drupal
Drupal Swag Shop
Demo
Demo online
Download
Return to content
Search form
Search
Log in
Create account
Support for Drupal 7 is ending on 5 January 2025—it’s time to migrate to Drupal 10! Learn about the many benefits of Drupal 10 and find migration tools in our resource center.
Learn more
Deprecated - Security advisories for contributed projects
This forum is deprecated —
view current Drupal contributed projects security advisories
SA-CONTRIB-2009-058 - Comment RSS - Access bypass
By
Drupal Security Team
on
16 Sep 2009 at 16:40 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2009-058
Project: Comment RSS (third-party module)
Version: 5.x, 6.x
Date: 2009-September-16
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-CONTRIB-2009-057 - Date - Cross Site Scripting
By
Drupal Security Team
on
16 Sep 2009 at 14:55 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2009-057
Project: Date (third-party module)
Version: 5.x, 6.x
Date: 2009-September-16
Security risk: Moderately critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2009-056 - Node2Node, Node Browser, Subdomain Manager, Quota by role, Rest API with vulnerabilities, now abandoned
By
Drupal Security Team
on
9 Sep 2009 at 16:52 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2009-056
Project: Node2Node, Node Browser, Subdomain Manager, Quota by role, Rest API (third-party modules)
Version: 5.x, 6.x
Date: 2009 Sept 9
Security risk: Critical
Exploitable from: Remote
Vulnerability: Multiple vulnerabilities
SA-CONTRIB-2009-055 - BUEditor - Cross Site Scripting
By
Drupal Security Team
on
9 Sep 2009 at 16:50 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2009-055
Project: BUEditor (third-party module)
Version: 5.x, 6.x
Date: 2009 September 9
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Cross Site Scripting
SA-CONTRIB-2009-054 - Go - url redirects - Multiple vulnerabilities
By
Drupal Security Team
on
26 Aug 2009 at 19:20 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2009-054
Project: Go - url redirects (third-party module)
Versions: 5.x, 6.x
Date: 2009 August 26
Security risk: Highly Critical
Exploitable from: Remote
Vulnerability: Multiple vulnerabilities
SA-CONTRIB-2009-053 - Ajax Table - Multiple vulnerabilities
By
Drupal Security Team
on
26 Aug 2009 at 18:30 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2009-053
Project: Ajax Table (third-party module)
Version: 5.x
Date: 2009-Aug-26
Security risk: Critical
Exploitable from: Remote
Vulnerability: Multiple vulnerabilities
Pages
« first
‹ previous
…
154
155
156
157
158
159
160
161
162
…
next ›
last »
Subscribe with RSS