Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2013-4432

Disclosure Date: May 19, 2014 (last updated October 05, 2023)
Mahara before 1.5.13, 1.6.x before 1.6.8, and 1.7.x before 1.7.4 does not properly restrict access to folders, which allows remote authenticated users to read arbitrary folders (1) by leveraging an active folder tab loaded before permissions were removed or (2) via the folder parameter to artefact/file/groupfiles.php.
0
Attacker Value
Unknown

CVE-2013-4429

Disclosure Date: May 19, 2014 (last updated October 05, 2023)
Mahara before 1.5.12, 1.6.x before 1.6.7, and 1.7.x before 1.7.3 does not properly restrict access to artefacts, which allows remote authenticated users to read arbitrary artefacts via the (1) artefact id in an upload action when creating a journal or (2) instconf_artefactid_selected[ID] parameter in an upload action when editing a block.
0
Attacker Value
Unknown

CVE-2013-4431

Disclosure Date: May 19, 2014 (last updated October 05, 2023)
Mahara before 1.5.12, 1.6.x before 1.6.7, and 1.7.x before 1.7.3 does not properly prevent access to blocks, which allows remote authenticated users to modify arbitrary blocks via the bock id in an edit request.
0
Attacker Value
Unknown

CVE-2013-4430

Disclosure Date: May 19, 2014 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in Mahara before 1.5.12, 1.6.x before 1.6.7, and 1.7.x before 1.7.3 allows remote attackers to inject arbitrary web script or HTML via the Host header to lib/web.php.
0
Attacker Value
Unknown

CVE-2012-2253

Disclosure Date: November 24, 2012 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in group/members.php in Mahara 1.5.x before 1.5.7 and 1.6.x before 1.6.2 allows remote attackers to inject arbitrary web script or HTML via the query parameter.
0
Attacker Value
Unknown

CVE-2010-2479

Disclosure Date: July 06, 2010 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in HTML Purifier before 4.1.1, as used in Mahara and other products, when the browser is Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0