Логотип exploitDog
product: "moodle"
Консоль
Логотип exploitDog

exploitDog

product: "moodle"
Moodle

Moodleсистема управления образовательными электронными курсами

Релизный цикл, информация об уязвимостях

Продукт: Moodle
Вендор: moodle

График релизов

4.55.05.120242025202620272028

Недавние уязвимости Moodle

Количество 2 647

github логотип

GHSA-c78f-pfch-h9wc

почти 4 года назад

Moodle before 1.6.2, when the configuration lacks (1) algebra or (2) tex filters, allows remote authenticated users to write LaTeX or MimeTeX output files to the top level of the dataroot directory via (a) filter/algebra/pix.php or (b) filter/tex/pix.php.

EPSS: Низкий
github логотип

GHSA-6rgj-rxh3-3g5j

почти 4 года назад

login/forgot_password.php in Moodle before 1.6.2 allows remote attackers to obtain sensitive information (e-mail addresses and Moodle account names) via a find action.

EPSS: Низкий
github логотип

GHSA-73q4-xm6m-m55x

почти 4 года назад

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

EPSS: Низкий
github логотип

GHSA-ph4r-v28v-v352

почти 4 года назад

backup/backup_scheduled.php in Moodle before 1.6.2 generates trace data with the full backup pathname even when debugging is disabled, which might allow attackers to obtain the pathname.

EPSS: Низкий
github логотип

GHSA-6jjc-cvfw-6mr6

почти 4 года назад

help.php in Moodle before 1.6.2 does not check the existence of certain help files before including them, which might allow remote authenticated users to obtain the path in an error message.

EPSS: Низкий
github логотип

GHSA-h9w8-4376-j344

почти 4 года назад

Moodle does not properly validate module instance id

EPSS: Низкий
github логотип

GHSA-r6j4-gmpg-6x9f

почти 4 года назад

The Database module in Moodle before 1.6.2 does not properly handle uploaded files, which has unspecified impact and remote attack vectors.

EPSS: Низкий
github логотип

GHSA-5h49-4p8x-9pc2

почти 4 года назад

Multiple cross-site scripting (XSS) vulnerabilities in Moodle before 1.6.2 might allow remote attackers to inject arbitrary web script or HTML via (1) the choose parameter in files/index.php and (2) the sub parameter in doc/index.php.

EPSS: Низкий
github логотип

GHSA-95qp-qwjg-22x9

почти 4 года назад

lib/setup.php in Moodle before 1.6.2 sets the error reporting level to 7 to display E_WARNING messages to users even if debugging is disabled, which might allow remote authenticated users to obtain sensitive information by triggering the messages.

EPSS: Низкий
github логотип

GHSA-68fm-qg53-rwwj

почти 4 года назад

SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-c78f-pfch-h9wc

Moodle before 1.6.2, when the configuration lacks (1) algebra or (2) tex filters, allows remote authenticated users to write LaTeX or MimeTeX output files to the top level of the dataroot directory via (a) filter/algebra/pix.php or (b) filter/tex/pix.php.

1%
Низкий
почти 4 года назад
github логотип
GHSA-6rgj-rxh3-3g5j

login/forgot_password.php in Moodle before 1.6.2 allows remote attackers to obtain sensitive information (e-mail addresses and Moodle account names) via a find action.

0%
Низкий
почти 4 года назад
github логотип
GHSA-73q4-xm6m-m55x

course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter.

0%
Низкий
почти 4 года назад
github логотип
GHSA-ph4r-v28v-v352

backup/backup_scheduled.php in Moodle before 1.6.2 generates trace data with the full backup pathname even when debugging is disabled, which might allow attackers to obtain the pathname.

0%
Низкий
почти 4 года назад
github логотип
GHSA-6jjc-cvfw-6mr6

help.php in Moodle before 1.6.2 does not check the existence of certain help files before including them, which might allow remote authenticated users to obtain the path in an error message.

0%
Низкий
почти 4 года назад
github логотип
GHSA-h9w8-4376-j344

Moodle does not properly validate module instance id

0%
Низкий
почти 4 года назад
github логотип
GHSA-r6j4-gmpg-6x9f

The Database module in Moodle before 1.6.2 does not properly handle uploaded files, which has unspecified impact and remote attack vectors.

0%
Низкий
почти 4 года назад
github логотип
GHSA-5h49-4p8x-9pc2

Multiple cross-site scripting (XSS) vulnerabilities in Moodle before 1.6.2 might allow remote attackers to inject arbitrary web script or HTML via (1) the choose parameter in files/index.php and (2) the sub parameter in doc/index.php.

0%
Низкий
почти 4 года назад
github логотип
GHSA-95qp-qwjg-22x9

lib/setup.php in Moodle before 1.6.2 sets the error reporting level to 7 to display E_WARNING messages to users even if debugging is disabled, which might allow remote authenticated users to obtain sensitive information by triggering the messages.

0%
Низкий
почти 4 года назад
github логотип
GHSA-68fm-qg53-rwwj

SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int.

2%
Низкий
почти 4 года назад

Уязвимостей на страницу


Поделиться