SA-2008-011 - Securesite - Access bypass

  • Advisory ID: DRUPAL-SA-2008-011
  • Project: Secure Site (third-party module)
  • Version: 5.x-1.0, 4.7.x-1.0
  • Date: 2008-January-30
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Access bypass

SA-2008-10 - Archive - Cross site scripting

  • Advisory ID: DRUPAL-SA-2008-010
  • Project: Archive (third-party module)
  • Version: 5.x
  • Date: 2008-January-23
  • Security risk: Less critical
  • Exploitable from: Remote
  • Vulnerability: Cross site scripting

SA-2008-009 - Workflow - Cross site scripting

  • Advisory ID: DRUPAL-SA-2008-009
  • Project: Workflow (third-party module)
  • Version: 4.7.x, 5.x
  • Date: 2008-January-23
  • Security risk: Not critical
  • Exploitable from: Remote
  • Vulnerability: Cross site scripting

SA-2008-008 - Meta tags - Arbitrary code execution

  • Advisory ID: DRUPAL-SA-2008-008
  • Project: Meta tags / Nodewords (third-party module)
  • Version: 5.x-1.6
  • Date: 2008-January-14
  • Security risk: Highly critical
  • Exploitable from: Remote
  • Vulnerability: Arbitrary code execution

SA-2008-004 - Fileshare - Arbitrary code execution

  • Advisory ID: DRUPAL-SA-2008-004
  • Project: Fileshare (third-party module)
  • Version: 4.7.x, 5.x
  • Date: 2008-January-10
  • Security risk: Highly critical
  • Exploitable from: Remote
  • Vulnerability: Arbitrary code execution

SA-2008-003 - BUEditor - CSRF

  • Advisory ID: DRUPAL-SA-2008-003
  • Project: BUEditor (third-party module)
  • Version: 4.7.x, 5.x
  • Date: 2008-January-10
  • Security risk: Not critical
  • Exploitable from: Remote
  • Vulnerability: Cross site request forgery

Pages

Subscribe with RSS Subscribe to RSS - Deprecated - Security advisories for contributed projects