Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-gv8f-43pg-c5qw: Moodle Improper Input Validation vulnerability

In affected versions of Moodle, users' names require additional sanitizing in the account confirmation email, to prevent a self-registration phishing risk. This issue has been patched in versions 3.9.8, 3.10.5 and 3.11.1.

ghsa
#vulnerability#git
GHSA-g6h6-4fp6-w33w: Moodle vulnerable to Stored Cross-site Scripting

In Moodle, ID numbers exported in HTML data formats required additional sanitizing to prevent a local stored XSS risk.

GHSA-35wf-3wq2-r3hx: Moodle has Incorrect Default Permissions

In Moodle, insufficient capability checks made it possible to remove other users' calendar URL subscriptions.

GHSA-f46j-r7q3-6cm2: Moodle SQL Injection vulnerability

In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.

GHSA-qc86-vgf2-6fq6: Moodle SQL Injection vulnerability

In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses.

GHSA-273w-7fxj-pcp6: Moodle vulnerable to Uncontrolled Resource Consumption

In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service.

GHSA-2563-fp9c-mgm8: Moodle Session Fixation vulnerability

In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.

GHSA-4rmj-w58m-fvch: Moodle vulnerable to Server-Side Request Forgery

In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk.

GHSA-hfxp-j95j-cwrp: uvdesk/community-skeleton vulnerable to Stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository uvdesk/community-skeleton prior to 1.1.0.

GHSA-qxpm-5ghc-6gc2: jeecg-boot contains SQL Injection vulnerability

jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.