Логотип exploitDog
bind:CVE-2011-4309
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-4309

Количество 4

Количество 4

ubuntu логотип

CVE-2011-4309

около 13 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2011-4309

около 13 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2011-4309

около 13 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attacke ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-g6cp-x8gq-65wc

больше 3 лет назад

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-4309

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
0%
Низкий
около 13 лет назад
nvd логотип
CVE-2011-4309

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

CVSS2: 5
0%
Низкий
около 13 лет назад
debian логотип
CVE-2011-4309

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attacke ...

CVSS2: 5
0%
Низкий
около 13 лет назад
github логотип
GHSA-g6cp-x8gq-65wc

Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу