Description
Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2954 | Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection. |
Github GHSA |
GHSA-cwh2-q44x-5w3c | Moodle Acceptance of Extraneous Untrusted Data With Trusted Data vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2024-08-02T07:59:44.808Z
Reserved: 2023-10-12T00:42:28.476Z
Link: CVE-2023-5548
No data.
Status : Modified
Published: 2023-11-09T20:15:10.390
Modified: 2024-11-21T08:41:59.337
Link: CVE-2023-5548
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA