Логотип exploitDog
bind:CVE-2006-4943
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-4943

Количество 4

Количество 4

ubuntu логотип

CVE-2006-4943

больше 18 лет назад

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2006-4943

больше 18 лет назад

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2006-4943

больше 18 лет назад

course/jumpto.php in Moodle before 1.6.2 does not validate the session ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-73q4-xm6m-m55x

около 3 лет назад

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-4943

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

CVSS2: 5
0%
Низкий
больше 18 лет назад
nvd логотип
CVE-2006-4943

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

CVSS2: 5
0%
Низкий
больше 18 лет назад
debian логотип
CVE-2006-4943

course/jumpto.php in Moodle before 1.6.2 does not validate the session ...

CVSS2: 5
0%
Низкий
больше 18 лет назад
github логотип
GHSA-73q4-xm6m-m55x

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу