Skip to main content
Skip to search
Can we use first and third party cookies and web beacons to
understand our audience, and to tailor promotions you see
?
Yes, please
No, do not track me
Drupal.org home
Discover Drupal
Drupal Core
Drupal CMS
Drupal AI
Case Studies
Drupal for Government
Drupal for Higher Education
Drupal for Nonprofit
Drupal for eCommerce
Drupal for FinTech
Drupal for Healthcare
Drupal for Media & Publishing
Build with Drupal
Download Drupal
Documentation
Getting started
Local Development Guide
Developer Resources
Drupal CMS User Guide
Drupal User Guide
API
Modules
Themes
Distributions
Issue queues
Security Advisories
Partners & Services
Find a Drupal Certified Partner
Become a Drupal Certified Partner
Find a Hosting Provider
Find a Migration Partner
Find Training
Drupal Steward
Community
About the Community
How to Contribute
DrupalCon
Events
Jobs / Careers
News & Blogs
Forum
Slack
Newsletters
Drupal Swag Shop
Support Drupal
The Drupal Association
Donate
Become a Partner
Become a Ripple Maker
Become an Organization Member
Drupal Swag Shop
Get Started
Try Drupal CMS
Try Hosting
Return to content
Search form
Search
Log in
Create account
Still on Drupal 7? Security support for Drupal 7 ended on 5 January 2025. Please visit our Drupal 7 End of Life resources page to review all of your options.
Migration Resource Center
Home
Deprecated
Deprecated - Newsletters
Deprecated - Security advisories for contributed projects
This forum is deprecated —
view current Drupal contributed projects security advisories
Novalnet Payment Module Ubercart - Critical - SQL Injection - Unsupported - SA-CONTRIB-2015-116
By
Drupal Security Team
on
3 Jun 2015 at 16:22 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2015-116
Project:
Novalnet Payment Module- Ubercart
(third-party module)
Version: 6.x, 7.x
Date: 2015-June-03
Security risk:
15/25 (
Critical
) AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All
Vulnerability: SQL Injection
Chamilo integration - Less Critical - Open Redirect - SA-CONTRIB-2015-115
By
Drupal Security Team
on
27 May 2015 at 17:51 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2015-115
Project:
Chamilo integration
(third-party module)
Version: 7.x
Date: 2015-May-27
Security risk:
8/25 (
Less Critical
) AC:Basic/A:User/CI:None/II:None/E:Theoretical/TD:All
Vulnerability: Open Redirect
Storage API - Moderately Critical - Access Bypass - SA-CONTRIB-2015-114
By
Drupal Security Team
on
27 May 2015 at 17:06 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2015-114
Project:
Storage API
(third-party module)
Version: 7.x
Date: 2015-May-27
Security risk:
13/25 (
Moderately Critical
) AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:Uncommon
Vulnerability: Access bypass
Aegir - Moderately Critical - Code Execution Prevention - SA-CONTRIB-2015-113
By
Drupal Security Team
on
20 May 2015 at 19:02 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2014-113
Project:
Hostmaster (Aegir)
(third-party module)
Version: 6.x, 7.x
Date: 2015-May-20
Security risk:
13/25 ( Moderately Critical) AC:Complex/A:Admin/CI:All/II:Some/E:Theoretical/TD:Default
Vulnerability: Arbitrary PHP code execution
Navigate - Moderately Critical - Multiple Vulnerabilities - Unsupported - SA-CONTRIB-2015-112
By
Drupal Security Team
on
20 May 2015 at 17:37 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2015-012
Project:
Navigate
(third-party module)
Version: 6.x, 7.x
Date: 2015-May-20
Security risk:
13/25 (
Moderately Critical
) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default
Vulnerability: Cross Site Scripting, Access bypass
Shipwire - Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-111
By
Drupal Security Team
on
20 May 2015 at 17:24 UTC
Advisory ID: DRUPAL-SA-CONTRIB-2015-111
Project:
Shipwire
(third-party module)
Version: 7.x
Date: 2015-May-20
Security risk:
15/25 (
Critical
) AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:All
Vulnerability: Information Disclosure
Pages
« first
‹ previous
…
30
31
32
33
34
35
36
37
38
…
next ›
last »
Subscribe with RSS