Page 76 of 390 results (0.014 seconds)

CVSS: 7.5EPSS: 2%CPEs: 7EXPL: 5

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo. • https://www.exploit-db.com/exploits/1663 http://retrogod.altervista.org/phpopenchat_30x_sql_xpl.html http://retrogod.altervista.org/simplog_092_incl_xpl.html http://secunia.com/advisories/17418 http://secunia.com/advisories/18233 http://secunia.com/advisories/18254 http://secunia.com/advisories/18260 http://secunia.com/advisories/18267 http://secunia.com/advisories/18276 http://secunia.com/advisories/19555 http://secunia.com/advisories/19590 http://secunia.com/advisories/19591& •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php. Múltiples vulnerabilidades de inyección de SQL en la función get_record en datalib.php de Moodle 1.5.2 permite a atacantes remotos ejecutar órdenes SQL de su elección mediante el parámetro id en (1) category.php y (2) info.php. • http://marc.info/?l=bugtraq&m=113165668814241&w=2 http://osvdb.org/20748 http://rgod.altervista.org/moodle16dev.html http://secunia.com/advisories/17526 http://securitytracker.com/id?1015181 http://www.securityfocus.com/bid/15380 http://www.vupen.com/english/advisories/2005/2387 https://exchange.xforce.ibmcloud.com/vulnerabilities/23058 •

CVSS: 2.6EPSS: 1%CPEs: 1EXPL: 2

jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter. jumto.php en Moodle 1.5.2 permite a atacantes remotos redirigir usuarios a otros sitios mediante el parámetro jump. • https://www.exploit-db.com/exploits/1312 http://marc.info/?l=bugtraq&m=113165668814241&w=2 http://rgod.altervista.org/moodle16dev.html http://secunia.com/advisories/17526 http://securityreason.com/securityalert/168 http://www.osvdb.org/20750 http://www.vupen.com/english/advisories/2005/2387 •

CVSS: 10.0EPSS: 0%CPEs: 15EXPL: 0

Multiple unknown vulnerabilities in Moodle before 1.5.1 have unknown impact and attack vectors. • http://moodle.org/doc/?frame=release.html http://secunia.com/advisories/16028 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

SQL injection vulnerability in sql.php in the Glossary module in Moodle 1.4.1 and earlier allows remote attackers to modify SQL statements. • http://cvs.sourceforge.net/viewcvs.py/moodle/moodle/mod/glossary/sql.php?r1=1.15.2.2&amp%3Br2=1.15.2.3 http://secunia.com/advisories/13091 http://securitytracker.com/id?1012113 http://www.osvdb.org/11427 http://www.securityfocus.com/bid/11608 https://exchange.xforce.ibmcloud.com/vulnerabilities/17965 •