Show filters
100 Total Results
Displaying 21-30 of 100
Sort by:
Attacker Value
Unknown

CVE-2013-1426

Disclosure Date: November 07, 2019 (last updated November 27, 2024)
Cross-site Scripting (XSS) in Mahara before 1.5.9 and 1.6.x before 1.6.4 allows remote attackers to inject arbitrary web script or HTML via the TinyMCE editor.
Attacker Value
Unknown

CVE-2019-9708

Disclosure Date: May 07, 2019 (last updated November 27, 2024)
An issue was discovered in Mahara 17.10 before 17.10.8, 18.04 before 18.04.4, and 18.10 before 18.10.1. A site administrator can suspend the system user (root), causing all users to be locked out from the system.
0
Attacker Value
Unknown

CVE-2019-9709

Disclosure Date: May 07, 2019 (last updated November 27, 2024)
An issue was discovered in Mahara 17.10 before 17.10.8, 18.04 before 18.04.4, and 18.10 before 18.10.1. The collection title is vulnerable to Cross Site Scripting (XSS) due to not escaping it when viewing the collection's SmartEvidence overview page (if that feature is turned on). This can be exploited by any logged-in user.
0
Attacker Value
Unknown

CVE-2018-11196

Disclosure Date: June 01, 2018 (last updated November 26, 2024)
Mahara 17.04 before 17.04.8 and 17.10 before 17.10.5 and 18.04 before 18.04.1 can be used as medium to transmit viruses by placing infected files into a Leap2A archive and uploading that to Mahara. In contrast to other ZIP files that are uploaded, ClamAV (when activated) does not check Leap2A archives for viruses, allowing malicious files to be available for download. While files cannot be executed on Mahara itself, Mahara can be used to transfer such files to user computers.
0
Attacker Value
Unknown

CVE-2018-11195

Disclosure Date: June 01, 2018 (last updated November 26, 2024)
Mahara 17.04 before 17.04.8 and 17.10 before 17.10.5 and 18.04 before 18.04.1 are vulnerable to the browser "back and refresh" attack. This allows malicious users with physical access to the web browser of a Mahara user, after they have logged in, to potentially gain access to their Mahara credentials.
0
Attacker Value
Unknown

CVE-2018-11565

Disclosure Date: May 30, 2018 (last updated November 26, 2024)
Mahara 17.04 before 17.04.8 and 17.10 before 17.10.5 and 18.04 before 18.04.1 are vulnerable to mentioning the usernames that are already taken by people registered in the system rather than masking that information.
0
Attacker Value
Unknown

CVE-2018-6182

Disclosure Date: April 09, 2018 (last updated November 26, 2024)
Mahara 16.10 before 16.10.9 and 17.04 before 17.04.7 and 17.10 before 17.10.4 are vulnerable to bad input when TinyMCE is bypassed by POST packages. Therefore, Mahara should not rely on TinyMCE's code stripping alone but also clean input on the server / PHP side as one can create own packets of POST data containing bad content with which to hit the server.
0
Attacker Value
Unknown

CVE-2017-17454

Disclosure Date: February 20, 2018 (last updated November 26, 2024)
Mahara 16.10 before 16.10.7 and 17.04 before 17.04.5 and 17.10 before 17.10.2 have a Cross Site Scripting (XSS) vulnerability when a user enters invalid UTF-8 characters. These are now going to be discarded in Mahara along with NULL characters and invalid Unicode characters. Mahara will also avoid direct $_GET and $_POST usage where possible, and instead use param_exists() and the correct param_*() function to fetch the expected value.
0
Attacker Value
Unknown

CVE-2017-17455

Disclosure Date: February 20, 2018 (last updated November 26, 2024)
Mahara 16.10 before 16.10.7, 17.04 before 17.04.5, and 17.10 before 17.10.2 are vulnerable to being forced, via a man-in-the-middle attack, to interact with Mahara on the HTTP protocol rather than HTTPS even when an SSL certificate is present.
0
Attacker Value
Unknown

CVE-2017-1000141

Disclosure Date: January 30, 2018 (last updated November 26, 2024)
An issue was discovered in Mahara before 18.10.0. It mishandled user requests that could discontinue a user's ability to maintain their own account (changing username, changing primary email address, deleting account). The correct behavior was to either prompt them for their password and/or send a warning to their primary email address.
0