-
CVE-2025-3645
•
published on April 25, 2025
A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses.
-
CVE-2025-3644
•
published on April 25, 2025
A flaw was found in Moodle. Additional checks were required to prevent users from deleting course sections they did not have permission to modify.
-
CVE-2025-3643
•
published on April 25, 2025
A flaw was found in Moodle. The return URL in the policy tool required additional sanitizing to prevent a reflected Cross-site scripting (XSS) risk.
-
CVE-2025-3642
•
published on April 25, 2025
A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default, this was only available to teachers and managers on sites with the EQUELLA repository enabled.
-
CVE-2025-3641
•
published on April 25, 2025
A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default, this was only available to teachers and managers on sites with the Dropbox repository enabled.
-
CVE-2025-3640
•
published on April 25, 2025
A flaw was found in Moodle. Insufficient capability checks made it possible for a user enrolled in a course to access some details, such as the full name and profile image URL, of other users they did not have permission to access.
-
CVE-2025-3638
•
published on April 25, 2025
A flaw was found in Moodle. The analysis request action in the Brickfield tool did not include the necessary token to prevent a Cross-site request forgery (CSRF) risk.
-
CVE-2025-3637
•
published on April 25, 2025
A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages.
-
CVE-2025-3636
•
published on April 25, 2025
A flaw was found in Moodle. This vulnerability allows unauthorized users to access and view RSS feeds due to insufficient capability checks.
-
CVE-2025-3635
•
published on April 25, 2025
A security vulnerability was discovered in Moodle that allows anyone to duplicate existing tours without needing to log in due to a lack of protection against cross-site request forgery (CSRF) attacks.
-
CVE-2025-3628
•
published on April 25, 2025
A flaw has was found in Moodle where anonymous assignment submissions can be de-anonymized via search, revealing student identities.
-
CVE-2025-3627
•
published on April 25, 2025
A security vulnerability was discovered in Moodle that allows some users to access sensitive information about other students before they finish verifying their identities using two-factor authentication (2FA).
-
CVE-2025-3625
•
published on April 25, 2025
A security vulnerability was discovered in Moodle that can allow hackers to gain access to sensitive information about students and prevent them from logging into their accounts, even after they had completed two-factor authentication (2FA).
-
CVE-2025-46618
•
published on April 25, 2025
In JetBrains TeamCity before 2025.03.1 stored XSS was possible on Data Directory tab
-
CVE-2025-46433
•
published on April 25, 2025
In JetBrains TeamCity before 2025.03.1 improper path validation in loggingPreset parameter was possible
-
CVE-2025-46432
•
published on April 25, 2025
In JetBrains TeamCity before 2025.03.1 base64-encoded credentials could be exposed in build logs
-
CVE-2025-43016
•
published on April 25, 2025
In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session
-
CVE-2025-3634
•
published on April 25, 2025
A security vulnerability was discovered in Moodle that allows students to enroll themselves in courses without completing all the necessary safety checks. Specifically, users can sign up for courses prematurely, even if they haven't finished two-step verification processes.
-
CVE-2024-6199
•
published on April 25, 2025
An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem.
Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
-
CVE-2024-6198
•
published on April 25, 2025
The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker
with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.