Can anyone advise me how I can information regarding how Moodle is managing these vulnerabilities?
The following vulnerabilities apply to the Internet-facing site (PHP 5.2.9):
Nov 29 2010 |
|
Nov 22 2010 |
PHP Use After Free in 'ext/imap/php_imap.c' Lets Remote Users Deny Service |
Nov 13 2010 |
PHP mb_strcut() May Disclose Potentially Sensitive Information |
Nov 8 2010 |
|
Oct 12 2010 |
PHP FILTER_VALIDATE_EMAIL Filter Bug Lets Remote Users Deny Service |
May 3 2010 |
PHP dechunk Filter Signed Comparison Error Lets Remote Users Deny Service |
Feb 27 2010 |
PHP Bugs Let Local Users Bypass safe_mode and open_basedir Security Controls |
Jan 14 2010 |
|
Dec 18 2009 |
PHP Session Function Corruption Flaw May Let Remote Users Execute Arbitrary Code |
Dec 18 2009 |
PHP Input Validation Flaw in htmlspecialchars() Permits Cross-Site Scripting Attacks |
Nov 20 2009 |
PHP Bugs Let Local Users Bypass safe_mode and open_basedir Security Controls |
Sep 18 2009 |
|
Apr 6 2009 |
Additional vulnerability applying to the Internal-facing site (PHP 5.2.8):
Dec 24 2008 |
PHP GD Library imageRotate() Validation Error Lets Users Obtain Potentially Sensitive Information |
Any advice is appreciated. Thanks.