Логотип exploitDog
product: "moodle"
Консоль
Логотип exploitDog

exploitDog

product: "moodle"
Moodle

Moodleсистема управления образовательными электронными курсами

Релизный цикл, информация об уязвимостях

Продукт: Moodle
Вендор: moodle

График релизов

4.14.24.34.44.55.02022202320242025202620272028

Недавние уязвимости Moodle

Количество 2 541

github логотип

GHSA-h9w8-4376-j344

больше 3 лет назад

Moodle does not properly validate module instance id

EPSS: Низкий
github логотип

GHSA-5h49-4p8x-9pc2

больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in Moodle before 1.6.2 might allow remote attackers to inject arbitrary web script or HTML via (1) the choose parameter in files/index.php and (2) the sub parameter in doc/index.php.

EPSS: Низкий
github логотип

GHSA-95qp-qwjg-22x9

больше 3 лет назад

lib/setup.php in Moodle before 1.6.2 sets the error reporting level to 7 to display E_WARNING messages to users even if debugging is disabled, which might allow remote authenticated users to obtain sensitive information by triggering the messages.

EPSS: Низкий
github логотип

GHSA-r6j4-gmpg-6x9f

больше 3 лет назад

The Database module in Moodle before 1.6.2 does not properly handle uploaded files, which has unspecified impact and remote attack vectors.

EPSS: Низкий
github логотип

GHSA-4r9p-m9h5-r8vm

больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php.

EPSS: Низкий
github логотип

GHSA-w979-xjw9-2g82

больше 3 лет назад

Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups.

EPSS: Низкий
github логотип

GHSA-68fm-qg53-rwwj

больше 3 лет назад

SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.

EPSS: Низкий
github логотип

GHSA-q9q3-j7rw-3j95

больше 3 лет назад

The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.

EPSS: Низкий
github логотип

GHSA-8348-4394-v2hm

больше 3 лет назад

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

EPSS: Средний
github логотип

GHSA-r7cj-2ghq-wj88

больше 3 лет назад

jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-h9w8-4376-j344

Moodle does not properly validate module instance id

0%
Низкий
больше 3 лет назад
github логотип
GHSA-5h49-4p8x-9pc2

Multiple cross-site scripting (XSS) vulnerabilities in Moodle before 1.6.2 might allow remote attackers to inject arbitrary web script or HTML via (1) the choose parameter in files/index.php and (2) the sub parameter in doc/index.php.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-95qp-qwjg-22x9

lib/setup.php in Moodle before 1.6.2 sets the error reporting level to 7 to display E_WARNING messages to users even if debugging is disabled, which might allow remote authenticated users to obtain sensitive information by triggering the messages.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-r6j4-gmpg-6x9f

The Database module in Moodle before 1.6.2 does not properly handle uploaded files, which has unspecified impact and remote attack vectors.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-4r9p-m9h5-r8vm

Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-w979-xjw9-2g82

Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-68fm-qg53-rwwj

SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-q9q3-j7rw-3j95

The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.

8%
Низкий
больше 3 лет назад
github логотип
GHSA-8348-4394-v2hm

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

21%
Средний
больше 3 лет назад
github логотип
GHSA-r7cj-2ghq-wj88

jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.

8%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться