Security
Headlines
HeadlinesLatestCVEs

Tag

#git

CVE-2023-5539: Official Moodle git projects - moodle.git/search

A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.

CVE
#git#rce
CVE-2023-5550: Official Moodle git projects - moodle.git/search

In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.

CVE-2023-5551: Official Moodle git projects - moodle.git/search

Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.

CVE-2023-5545: Official Moodle git projects - moodle.git/search

H5P metadata automatically populated the author with the user's username, which could be sensitive information.

CVE-2023-5548: Official Moodle git projects - moodle.git/search

Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.

CVE-2023-5544: Official Moodle git projects - moodle.git/search

Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.

CVE-2023-5546: Official Moodle git projects - moodle.git/search

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

CVE-2023-5542: Official Moodle git projects - moodle.git/search

Students in "Only see own membership" groups could see other students in the group, which should be hidden.

Opinion: The Pros and Cons of the UK’s New Digital Regulation Principles 

By Daily Contributors By Liz Smith, Digital Marketing Consultant for Elsewhen – Digital technologies have transformed how we live, work, and… This is a post from HackRead.com Read the original post: Opinion: The Pros and Cons of the UK’s New Digital Regulation Principles

A new video series, Google Forms spam and the various gray areas of cyber attacks

It can be easy to get caught up in the “big” questions in cybersecurity, like how to stop ransomware globally or keep hospitals up and running when they’re targeted by data theft extortion.