Логотип exploitDog
product: "moodle"
Консоль
Логотип exploitDog

exploitDog

product: "moodle"
Moodle

Moodleсистема управления образовательными электронными курсами

Релизный цикл, информация об уязвимостях

Продукт: Moodle
Вендор: moodle

График релизов

4.14.24.34.44.55.05.12022202320242025202620272028

Недавние уязвимости Moodle

Количество 2 577

github логотип

GHSA-68fm-qg53-rwwj

больше 3 лет назад

SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.

EPSS: Низкий
github логотип

GHSA-4r9p-m9h5-r8vm

больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php.

EPSS: Низкий
github логотип

GHSA-w979-xjw9-2g82

больше 3 лет назад

Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups.

EPSS: Низкий
github логотип

GHSA-q9q3-j7rw-3j95

больше 3 лет назад

The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.

EPSS: Низкий
github логотип

GHSA-8348-4394-v2hm

больше 3 лет назад

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

EPSS: Средний
github логотип

GHSA-r7cj-2ghq-wj88

больше 3 лет назад

jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.

EPSS: Низкий
github логотип

GHSA-389j-qw4x-m76h

больше 3 лет назад

Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php.

EPSS: Низкий
github логотип

GHSA-5xqf-3mwv-q7gm

больше 3 лет назад

Multiple unknown vulnerabilities in Moodle before 1.5.1 have unknown impact and attack vectors.

EPSS: Низкий
github логотип

GHSA-6q9g-3vfq-q2qj

больше 3 лет назад

Improper Authentication in moodle

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-c5hf-mc85-2hx4

больше 3 лет назад

Missing authorization in Moodle

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-68fm-qg53-rwwj

SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.

2%
Низкий
больше 3 лет назад
github логотип
GHSA-4r9p-m9h5-r8vm

Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-w979-xjw9-2g82

Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-q9q3-j7rw-3j95

The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.

8%
Низкий
больше 3 лет назад
github логотип
GHSA-8348-4394-v2hm

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

21%
Средний
больше 3 лет назад
github логотип
GHSA-r7cj-2ghq-wj88

jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.

8%
Низкий
больше 3 лет назад
github логотип
GHSA-389j-qw4x-m76h

Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php.

1%
Низкий
больше 3 лет назад
github логотип
GHSA-5xqf-3mwv-q7gm

Multiple unknown vulnerabilities in Moodle before 1.5.1 have unknown impact and attack vectors.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-6q9g-3vfq-q2qj

Improper Authentication in moodle

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-c5hf-mc85-2hx4

Missing authorization in Moodle

CVSS3: 4.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться