{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T19:43:58.245","vulnerabilities":[{"cve":{"id":"CVE-2012-1169","sourceIdentifier":"secalert@redhat.com","published":"2019-11-14T17:15:12.973","lastModified":"2024-11-21T01:36:34.917","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Moodle before 2.2.2 has Personal information disclosure, when administrative setting users name display is set to first name only full names are shown in page breadcrumbs."},{"lang":"es","value":"Moodle versiones anteriores a la versión 2.2.2, tiene una divulgación de información personal, cuando la configuración administrativa de la visualización del nombre de los usuarios es establecida con el nombre solo se muestran los nombres completos en las rutas de navegación de la página."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:L\/I:N\/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:N\/C:P\/I:N\/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*","versionEndExcluding":"2.2.2","matchCriteriaId":"1B540235-AD20-48B5-9F07-A6899AF88F9B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*","matchCriteriaId":"9396E005-22D8-4342-9323-C7DEA379191D"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*","matchCriteriaId":"706C6399-CAD1-46E3-87A2-8DFE2CF497ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","matchCriteriaId":"2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188"}]}]}],"references":[{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-April\/077635.html","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-April\/078209.html","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-April\/078210.html","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-May\/080712.html","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-May\/081047.html","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https:\/\/access.redhat.com\/security\/cve\/cve-2012-1169","source":"secalert@redhat.com","tags":["Broken Link"]},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2012-1169","source":"secalert@redhat.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https:\/\/moodle.org\/mod\/forum\/discuss.php?d=198625","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"https:\/\/security-tracker.debian.org\/tracker\/CVE-2012-1169","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-April\/077635.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-April\/078209.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-April\/078210.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-May\/080712.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http:\/\/lists.fedoraproject.org\/pipermail\/package-announce\/2012-May\/081047.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/access.redhat.com\/security\/cve\/cve-2012-1169","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2012-1169","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https:\/\/moodle.org\/mod\/forum\/discuss.php?d=198625","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https:\/\/security-tracker.debian.org\/tracker\/CVE-2012-1169","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}