FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
ab02f981-ab9e-11e6-ae1b-002590263bf5moodle -- multiple vulnerabilities

Marina Glancy reports:

  • MSA-16-0022: Web service tokens should be invalidated when the user password is changed or forced to be changed.


Discovery 2016-09-12
Entry 2016-11-16
moodle29
< 2.9.8

moodle30
< 3.0.6

moodle31
< 3.1.2

CVE-2016-7038
https://moodle.org/security/
f6565fbf-ab9e-11e6-ae1b-002590263bf5moodle -- multiple vulnerabilities

Marina Glancy reports:

  • MSA-16-0023: Question engine allows access to files that should not be available

  • MSA-16-0024: Non-admin site managers may accidentally edit admins via web services

  • MSA-16-0025: Capability to view course notes is checked in the wrong context

  • MSA-16-0026: When debugging is enabled, error exceptions returned from webservices could contain private data


Discovery 2016-11-14
Entry 2016-11-16
Modified 2016-11-27
moodle29
< 2.9.9

moodle30
< 3.0.7

moodle31
< 3.1.3

CVE-2016-8642
CVE-2016-8643
CVE-2016-8644
https://moodle.org/security/
f72d98d1-0b7e-11e7-970f-002590263bf5moodle -- multiple vulnerabilities

Marina Glancy reports:

  • MSA-17-0001: System file inclusion when adding own preset file in Boost theme

  • MSA-17-0002: Incorrect sanitation of attributes in forums

  • MSA-17-0003: PHPMailer vulnerability in no-reply address

  • MSA-17-0004: XSS in assignment submission page


Discovery 2017-01-17
Entry 2017-03-18
Modified 2020-06-24
moodle29
le 2.9.9

moodle30
< 3.0.8

moodle31
< 3.1.4

moodle32
< 3.2.1

CVE-2017-2576
CVE-2017-2578
CVE-2016-10045
https://moodle.org/security/
df45b4bd-0b7f-11e7-970f-002590263bf5moodle -- multiple vulnerabilities

Marina Glancy reports:

In addition to a number of bug fixes and small improvements, security vulnerabilities have been discovered and fixed. We highly recommend that you upgrade your sites as soon as possible. Upgrading should be very straightforward. As per our usual policy, admins of all registered Moodle sites will be notified of security issue details directly via email and we'll publish details more widely in a week.


Discovery 2017-03-13
Entry 2017-03-18
moodle29
le 2.9.9

moodle30
< 3.0.9

moodle31
< 3.1.5

moodle32
< 3.2.2

https://moodle.org/news/#p1408104