Intelliboard
Tags Vulnerability

Tag: vulnerability

Updated on May 17th, 2019. Currently the vulnerability has been deemed as "Rejected," meaning it's not really an issue. Read a response from Moodle HQ with details at the bottom. On April 28th, a vulnerability affecting Moodle 3.6.3 was documented...
Last September, the World Wide Web Consortium (W3C), representing “major organizations such as Google, Microsoft, Netflix, Mozilla, Apple, Adobe,” published specifications for Encrypted Media Extensions (EME) and recommended its adoption as a modern web standard. According to the...
The liberal arts EdTech collaborative CLAMP has released a scheduled maintenance version of LAE. Two posts announce the new versions of Moodle "Liberal Arts Edition", one for Moodle 2.7.19, 3.0.9 and 3.1.5; the other for Moodle 3.2.2.   In recent days,...
Disponible también en Español. IT vulnerability researcher Netanel Rubin has detailed a critical loophole in Moodle that would let a hacker execute malicious code on behalf of the site. This flaw affects all Moodle versions, and it has already been...
Kind Attention all Moodle site administrators!! Recently a serious security bug in Moodle code was observed and demonstrated which allows an attacker to execute code at Moodle Server. Moodle HQ has promptly looked into the bug and provided a security...
All online systems are highly complex and contains security issues which are discovered from time to time and fixed to prevent any mishappening. Moodle project also involves a lot of programming and the security issues are reported by...
New minor releases of each supported branch of Moodle are now available. The unscheduled release is due to a security threat which was identified recently. According to the announcement, Moodle 2.8.3, 2.7.5 and 2.6.8 are now available via the usual...
If you're running Moodle over HTTPS with an SSL certificate you may need to patch your Moodle server to remove the vulnerability known as Heartbleed. As stated by Matthew Spurrier, Moodle HQ Systems Administrator, This vulnerability allows exploitation of the...