Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Why Drupal?
About Drupal
Platform overview
Drupal 10
Content Authoring
Content as a Service
Decoupled
Accessibility
Marketing Automation
Multilingual
Security
Personalization
Case studies
Video series
News
Use cases
For Developers
For Marketers
E-commerce
Education
FinTech
Government
Healthcare
High Tech
Nonprofit
Retail
Travel
Resources
Installing Drupal
Documentation
User guide
Local Development Guide
Security
News
Blog
Drupal 7 Migrations
Services
Find an Agency Partner
Find a D7 Migration Partner
Find Integrations & Hosting
Find Drupal Training
Become a Certified Partner
Community
How to Contribute
About the Community
Support
Community Governance
Jobs/Careers
Events
DrupalCon Portland 2024
DrupalCon Barcelona 2024
Community Events
Download
Download
Modules
Themes
Distributions
Issue queues
Browse Repository
Give
Drupal Association
Become an Organization Member
Become a Certified Partner
Become an Individual Member
Make a Donation
Discover Drupal
Drupal Swag Shop
Demo
Demo online
Download
Return to content
Search form
Search
Log in
Create account
Support for Drupal 7 is ending on 5 January 2025—it’s time to migrate to Drupal 10! Learn about the many benefits of Drupal 10 and find migration tools in our resource center.
Learn more
Deprecated - Security advisories for contributed projects
This forum is deprecated —
view current Drupal contributed projects security advisories
SA-2008-065 - Node Clone - Access bypass
By
pwolanin
on
15 Oct 2008 at 18:27 UTC
Advisory ID: DRUPAL-SA-2008-065
Project: Node Clone (third-party module)
Version: 6.x, and 5.x.
Date: 2008-October-15
Security risk: Less critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-2008-064 - Node Vote - SQL injection vulnerability
By
kbahey
on
15 Oct 2008 at 16:46 UTC
Advisory ID: DRUPAL-SA-2008-064
Project: Node Vote (third-party module)
Versions: 5.x and 6.x
Date: 2008-October-15
Security risk: Critical
Exploitable from: Remote
Vulnerability: SQL injection
SA-2008-063 - multiple third party modules - Access bypass due to incorrect Drupal 6 updates
By
pwolanin
on
9 Oct 2008 at 19:41 UTC
Advisory ID: DRUPAL-SA-2008-063
Project: Several Third-Party Modules incorrectly updated for the Drupal 6 menu system
Version: 6.x
Date: 2008-October-8
Security risk: Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-2008-062 - SIOC - access bypass
By
Amazon
on
8 Oct 2008 at 21:47 UTC
Advisory ID: DRUPAL-SA-2008-062
Project: SIOC (third-party module)
Versions: 5.x and 6.x
Date: 2008-October-08
Security risk: Moderately critical
Exploitable from: Remote
Vulnerability: Access bypass
SA-2008-061 - Everyblog - Multiple vulnerabilities
By
Amazon
on
8 Oct 2008 at 21:45 UTC
Advisory ID: DRUPAL-SA-2008-061
Project: EveryBlog (third-party module)
Versions: 5.x and 6.x
Date: 2008-October-08
Security risk: Highly critical
Exploitable from: Remote
Vulnerability:SQL injection, Cross-site scripting (XSS), Privilege escalation, access bypass
SA-2008-059 - Brilliant Gallery - SQL Injection and Cross Site Scripting
By
kbahey
on
1 Oct 2008 at 20:24 UTC
Advisory ID: DRUPAL-SA-2008-059
Project: Brilliant Gallery (third-party module)
Versions: 5.x
Date: 2008-October-1
Security risk: Critical
Exploitable from: Remote
Vulnerability: SQL injection and Cross Site Scripting
Pages
« first
‹ previous
…
165
166
167
168
169
170
171
172
173
…
next ›
last »
Subscribe with RSS