Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "24F2602B-8ED3-4026-A9A4-31BE8BDC7724", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "D7F24649-B67F-4809-9F54-7B623AEF5A4A", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "6B81655E-C3B5-4115-A4C4-B7AC2FCDAB7F", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "ED9C3840-66BE-47EC-9F0C-E9D2171FF0B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "DBD062EB-1B1F-4DC8-A4F9-C2EC7D401E9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "291F73E9-1059-4E7F-860F-0DF2A35AA456", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "0EB5859E-0996-46B5-BB44-34BD6EACBCF5", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "F87F6707-99AB-478A-909D-1D87298D5514", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "4BCE8B26-58BB-471C-B291-E6AE22B96C5B", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "768CE5AF-955B-4148-998A-A46BBDBA618B", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "4283440F-9B21-4CE9-81FF-79DF3DEDCEE7", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "A989FADA-89C3-472B-86BF-0630D1CBBCA8", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "4FAF84CB-46F1-4F37-BBAC-1CED0600B5B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*", "matchCriteriaId": "8FCA633D-E6CA-4D38-937B-9F83179CDAEA", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD248A1D-CACC-4E76-925A-078B736442AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B8A0403-0869-495F-B7C0-13A387549C7A", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "39791F43-CF89-485B-AA8B-634C282BB025", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "428E4846-8C9E-4592-8437-88FCDCED704D", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4096977-3258-48B0-9C7B-D43FBC8BB1EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "448E5353-CD0E-407C-84F4-5E6D014A28FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "18C6F348-DAE9-4440-8B3A-8D92ADC6606F", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "367537BF-CBDF-4CBB-91B4-6E5A567EF605", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DABBF325-C48A-4838-AC5D-0565C78976CD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "CRLF injection vulnerability in calendar/set.php in the Calendar subsystem in Moodle 1.9.x before 1.9.15, 2.0.x before 2.0.6, and 2.1.x before 2.1.3 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors."}, {"lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n CRLF en calendar/set.php en el subsistema de Calendario en Moodle v1.9.x antes de v1.9.15, v2.0.x antes de v2.0.6 y v2.1.x antes v2.1.3 que permite a atacantes remotos inyectar cabeceras HTTP de su elecci\u00f3n y llevar a cabo ataques de divisi\u00f3n de respuesta HTTP a trav\u00e9s de vectores no especificados.\r\n"}], "id": "CVE-2011-4586", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-07-20T10:40:35.923", "references": [{"source": "secalert@redhat.com", "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=581e8dba387f090d89382115fd850d8b44351526"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://moodle.org/mod/forum/discuss.php?d=191754"}, {"source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2421"}, {"source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=581e8dba387f090d89382115fd850d8b44351526"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://moodle.org/mod/forum/discuss.php?d=191754"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2421"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}