SQL injection vulnerability in blog/index.php in the blog module in Moodle 1.6.2 allows remote attackers to execute arbitrary SQL commands via a double-encoded tag parameter.
References
Configurations
History
21 Nov 2024, 00:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3 - Patch | |
References | () http://marc.info/?l=full-disclosure&m=116034301209228&w=2 - | |
References | () http://secunia.com/advisories/22309 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1699 - | |
References | () http://www.securityfocus.com/archive/1/448018/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/448023/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/20395 - Exploit, Patch | |
References | () http://www.vupen.com/english/advisories/2006/3957 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29377 - |
Information
Published : 2006-10-10 04:06
Updated : 2024-11-21 00:18
NVD link : CVE-2006-5219
Mitre link : CVE-2006-5219
CVE.ORG link : CVE-2006-5219
JSON object : View
Products Affected
moodle
- moodle
CWE