Page 5 of 86 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 8EXPL: 0

If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk. • https://bugzilla.redhat.com/show_bug.cgi?id=2179419 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF https://moodle.org/mod/forum/discuss.php?d=445064 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 9EXPL: 0

The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS). • https://bugzilla.redhat.com/show_bug.cgi?id=2179422 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF https://moodle.org/mod/forum/discuss.php?d=445065 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 2

In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin. • https://github.com/dinhbaouit/CVE-2021-36394 https://github.com/lavclash75/CVE-2021-36394-Pre-Auth-RCE-in-Moodle https://moodle.org/mod/forum/discuss.php?d=424799 • CWE-384: Session Fixation •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

In Moodle, insufficient capability checks meant message deletions were not limited to the current user. • https://moodle.org/mod/forum/discuss.php?d=424803 • CWE-276: Incorrect Default Permissions •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk. • https://github.com/T0X1Cx/CVE-2021-36396-Exploit https://moodle.org/mod/forum/discuss.php?d=424802 • CWE-918: Server-Side Request Forgery (SSRF) •