Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4fm4-pcw7-99hg

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

EPSS

Процентиль: 60%
0.0041
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

nvd
почти 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

debian
почти 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and ...

EPSS

Процентиль: 60%
0.0041
Низкий