Moodle — система управления образовательными электронными курсами
Релизный цикл, информация об уязвимостях
График релизов
Количество 2 577
GHSA-68fm-qg53-rwwj
SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.
GHSA-4r9p-m9h5-r8vm
Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php.
GHSA-w979-xjw9-2g82
Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups.
GHSA-q9q3-j7rw-3j95
The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.
GHSA-8348-4394-v2hm
Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.
GHSA-r7cj-2ghq-wj88
jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.
GHSA-389j-qw4x-m76h
Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php.
GHSA-5xqf-3mwv-q7gm
Multiple unknown vulnerabilities in Moodle before 1.5.1 have unknown impact and attack vectors.
GHSA-6q9g-3vfq-q2qj
Improper Authentication in moodle
GHSA-c5hf-mc85-2hx4
Missing authorization in Moodle
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
|---|---|---|---|---|
GHSA-68fm-qg53-rwwj SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int. | 2% Низкий | больше 3 лет назад | ||
GHSA-4r9p-m9h5-r8vm Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php. | 0% Низкий | больше 3 лет назад | ||
GHSA-w979-xjw9-2g82 Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups. | 0% Низкий | больше 3 лет назад | ||
GHSA-q9q3-j7rw-3j95 The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter. | 8% Низкий | больше 3 лет назад | ||
GHSA-8348-4394-v2hm Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo. | 21% Средний | больше 3 лет назад | ||
GHSA-r7cj-2ghq-wj88 jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter. | 8% Низкий | больше 3 лет назад | ||
GHSA-389j-qw4x-m76h Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php. | 1% Низкий | больше 3 лет назад | ||
GHSA-5xqf-3mwv-q7gm Multiple unknown vulnerabilities in Moodle before 1.5.1 have unknown impact and attack vectors. | 0% Низкий | больше 3 лет назад | ||
GHSA-6q9g-3vfq-q2qj Improper Authentication in moodle | CVSS3: 4.3 | 0% Низкий | больше 3 лет назад | |
GHSA-c5hf-mc85-2hx4 Missing authorization in Moodle | CVSS3: 4.3 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу