Page 7 of 58 results (0.021 seconds)

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 0

Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers). • https://bugzilla.redhat.com/show_bug.cgi?id=2179406 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF https://moodle.org/mod/forum/discuss.php?d=445061 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Authenticated users were able to enumerate other users' names via the learning plans page. • https://bugzilla.redhat.com/show_bug.cgi?id=2179423 https://moodle.org/mod/forum/discuss.php?d=445066 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.1EPSS: 0%CPEs: 8EXPL: 0

Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk. • https://bugzilla.redhat.com/show_bug.cgi?id=2179418 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF https://moodle.org/mod/forum/discuss.php?d=445063 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access. • https://bugzilla.redhat.com/show_bug.cgi?id=2179426 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF https://moodle.org/mod/forum/discuss.php?d=445068 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk. • https://bugzilla.redhat.com/show_bug.cgi?id=2179424 https://moodle.org/mod/forum/discuss.php?d=445067 • CWE-352: Cross-Site Request Forgery (CSRF) •