Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4fm4-pcw7-99hg

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

EPSS

Процентиль: 38%
0.00162
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

nvd
около 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

debian
около 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and ...

EPSS

Процентиль: 38%
0.00162
Низкий