Логотип exploitDog
bind:CVE-2011-4309
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-4309

Количество 4

Количество 4

ubuntu логотип

CVE-2011-4309

почти 13 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2011-4309

почти 13 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2011-4309

почти 13 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attacke ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-g6cp-x8gq-65wc

около 3 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-4309

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
0%
Низкий
почти 13 лет назад
nvd логотип
CVE-2011-4309

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
0%
Низкий
почти 13 лет назад
debian логотип
CVE-2011-4309

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attacke ...

CVSS2: 5
0%
Низкий
почти 13 лет назад
github логотип
GHSA-g6cp-x8gq-65wc

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу