Total vulnerabilities in the database
Authenticated users were able to enumerate other users' names via the learning plans page.
Software | From | Fixed in |
---|---|---|
moodle / moodle | 4.0.0 | 4.0.0.x |
moodle / moodle | 4.1.0 | 4.1.0.x |
moodle / moodle | 4.0.0.x | 4.0.7 |
moodle / moodle | 4.1.1 | 4.1.1.x |
![]() |
4.1.0 | 4.1.2 |
![]() |
4.0.0 | 4.0.7 |
![]() |
3.11.0 | 3.11.13 |
![]() |
- | 3.9.20 |