Show filters
601 Total Results
Displaying 111-120 of 601
Sort by:
Attacker Value
Unknown

CVE-2024-26134

Disclosure Date: February 19, 2024 (last updated January 06, 2025)
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.
Attacker Value
Unknown

CVE-2024-25983

Disclosure Date: February 19, 2024 (last updated January 24, 2025)
Insufficient checks in a web service made it possible to add comments to the comments block on another user's dashboard when it was not otherwise available (e.g., on their profile page).
Attacker Value
Unknown

CVE-2024-25982

Disclosure Date: February 19, 2024 (last updated January 24, 2025)
The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.
Attacker Value
Unknown

CVE-2024-25981

Disclosure Date: February 19, 2024 (last updated January 24, 2025)
Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups. By default this only provided additional access to non-editing teachers.
Attacker Value
Unknown

CVE-2024-25980

Disclosure Date: February 19, 2024 (last updated January 24, 2025)
Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups. By default this only provided additional access to non-editing teachers.
Attacker Value
Unknown

CVE-2024-25979

Disclosure Date: February 19, 2024 (last updated January 24, 2025)
The URL parameters accepted by forum search were not limited to the allowed parameters.
Attacker Value
Unknown

CVE-2024-25978

Disclosure Date: February 19, 2024 (last updated January 24, 2025)
Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality.
Attacker Value
Unknown

CVE-2023-5679

Disclosure Date: February 13, 2024 (last updated October 23, 2024)
A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
Attacker Value
Unknown

CVE-2023-5517

Disclosure Date: February 13, 2024 (last updated October 23, 2024)
A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when: - `nxdomain-redirect <domain>;` is configured, and - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response. This issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
Attacker Value
Unknown

CVE-2023-4408

Disclosure Date: February 13, 2024 (last updated October 22, 2024)
The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.