Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "24F2602B-8ED3-4026-A9A4-31BE8BDC7724", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "D7F24649-B67F-4809-9F54-7B623AEF5A4A", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "6B81655E-C3B5-4115-A4C4-B7AC2FCDAB7F", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "ED9C3840-66BE-47EC-9F0C-E9D2171FF0B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "DBD062EB-1B1F-4DC8-A4F9-C2EC7D401E9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "291F73E9-1059-4E7F-860F-0DF2A35AA456", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "0EB5859E-0996-46B5-BB44-34BD6EACBCF5", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "F87F6707-99AB-478A-909D-1D87298D5514", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "4BCE8B26-58BB-471C-B291-E6AE22B96C5B", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "768CE5AF-955B-4148-998A-A46BBDBA618B", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "4283440F-9B21-4CE9-81FF-79DF3DEDCEE7", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "A989FADA-89C3-472B-86BF-0630D1CBBCA8", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "4FAF84CB-46F1-4F37-BBAC-1CED0600B5B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*", "matchCriteriaId": "8FCA633D-E6CA-4D38-937B-9F83179CDAEA", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD248A1D-CACC-4E76-925A-078B736442AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B8A0403-0869-495F-B7C0-13A387549C7A", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "39791F43-CF89-485B-AA8B-634C282BB025", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "428E4846-8C9E-4592-8437-88FCDCED704D", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4096977-3258-48B0-9C7B-D43FBC8BB1EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "448E5353-CD0E-407C-84F4-5E6D014A28FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "18C6F348-DAE9-4440-8B3A-8D92ADC6606F", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "367537BF-CBDF-4CBB-91B4-6E5A567EF605", "vulnerable": true}, {"criteria": "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DABBF325-C48A-4838-AC5D-0565C78976CD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "lib/moodlelib.php in Moodle 1.9.x before 1.9.15, 2.0.x before 2.0.6, and 2.1.x before 2.1.3 does not properly handle certain zero values in the password policy, which makes it easier for remote attackers to obtain access by leveraging the possible existence of user accounts that have unchangeable blank passwords."}, {"lang": "es", "value": "lib/moodlelib.php en Moodle v1.9.x antes de v1.9.15, v2.0.x antes de v2.0.6 y v2.1.x antes de v2.1.3 no maneja adecuadamente ciertos valores de cero en la pol\u00edtica de contrase\u00f1as, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos a la hora de obtener acceso aprovech\u00e1ndose de la posible existencia de cuentas de usuario con contrase\u00f1as en blanco.\r\n"}], "id": "CVE-2011-4587", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-07-20T10:40:35.970", "references": [{"source": "secalert@redhat.com", "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=e079e82c087becf06d902089d14f3f76686bde19"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://moodle.org/mod/forum/discuss.php?d=191755"}, {"source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2421"}, {"source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=e079e82c087becf06d902089d14f3f76686bde19"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://moodle.org/mod/forum/discuss.php?d=191755"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2421"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=761248"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-255"}], "source": "nvd@nist.gov", "type": "Primary"}]}