Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67962
Category:Fedora Local Security Checks
Title:Fedora Core 14 FEDORA-2010-13396 (moodle)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to moodle
announced via advisory FEDORA-2010-13396.

References:

[ 1 ] Bug #620743 - CVE-2010-2795 php-pear-CAS: authenticated session hijack by providing new well formed ticket (PHPCAS-61)
https://bugzilla.redhat.com/show_bug.cgi?id=620743
[ 2 ] Bug #620751 - CVE-2010-2796 php-pear-CAS: XSS in proxy mode (PHPCAS-67)
https://bugzilla.redhat.com/show_bug.cgi?id=620751
[ 3 ] Bug #624753 - CVE-2010-2479 moodle, sahana: XSS flaw in embedded HTML Purifier allows remote arbitrary web script injection
https://bugzilla.redhat.com/show_bug.cgi?id=624753

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update moodle' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-13396

Risk factor : Medium

CVSS Score:
4.3

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-2795
40845
http://secunia.com/advisories/40845
41240
http://secunia.com/advisories/41240
42149
http://secunia.com/advisories/42149
42162
http://www.securityfocus.com/bid/42162
42184
http://secunia.com/advisories/42184
43427
http://secunia.com/advisories/43427
ADV-2010-2234
http://www.vupen.com/english/advisories/2010/2234
ADV-2010-2261
http://www.vupen.com/english/advisories/2010/2261
ADV-2010-2909
http://www.vupen.com/english/advisories/2010/2909
ADV-2011-0456
http://www.vupen.com/english/advisories/2011/0456
DSA-2172
http://www.debian.org/security/2011/dsa-2172
FEDORA-2010-12247
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
FEDORA-2010-12258
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
FEDORA-2010-16905
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
FEDORA-2010-16912
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
https://forge.indepnet.net/projects/glpi/repository/revisions/12601
https://issues.jasig.org/browse/PHPCAS-61
https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
phpcas-tickets-session-hijacking(60894)
https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
Common Vulnerability Exposure (CVE) ID: CVE-2010-2796
42160
http://www.securityfocus.com/bid/42160
https://issues.jasig.org/browse/PHPCAS-67
phpcas-callback-url-xss(60895)
https://exchange.xforce.ibmcloud.com/vulnerabilities/60895
Common Vulnerability Exposure (CVE) ID: CVE-2010-2479
39613
http://secunia.com/advisories/39613
40431
http://secunia.com/advisories/40431
41259
http://www.securityfocus.com/bid/41259
http://htmlpurifier.org/news/2010/0531-4.1.1-released
http://repo.or.cz/w/htmlpurifier.git/commitdiff/18e538317a877a0509ae71a860429c41770da230
http://wiki.mahara.org/Release_Notes/1.0.15
http://wiki.mahara.org/Release_Notes/1.1.9
http://wiki.mahara.org/Release_Notes/1.2.5
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.