Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-4592

Опубликовано: 20 июл. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

РелизСтатусПримечание
devel

not-affected

1.9.9.dfsg2-5
hardy

ignored

end of life
lucid

ignored

end of life
maverick

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

not-affected

1.9.9.dfsg2-5
quantal

not-affected

1.9.9.dfsg2-5
raring

not-affected

1.9.9.dfsg2-5
saucy

not-affected

1.9.9.dfsg2-5

Показывать по

Ссылки на источники

EPSS

Процентиль: 60%
0.0041
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
почти 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

debian
почти 13 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and ...

github
около 3 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

EPSS

Процентиль: 60%
0.0041
Низкий

5 Medium

CVSS2