Логотип exploitDog
product: "moodle"
Консоль
Логотип exploitDog

exploitDog

product: "moodle"
Moodle

Moodleсистема управления образовательными электронными курсами

Релизный цикл, информация об уязвимостях

Продукт: Moodle
Вендор: moodle

График релизов

4.55.05.120242025202620272028

Недавние уязвимости Moodle

Количество 2 647

github логотип

GHSA-4r9p-m9h5-r8vm

почти 4 года назад

Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php.

EPSS: Низкий
github логотип

GHSA-w979-xjw9-2g82

почти 4 года назад

Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups.

EPSS: Низкий
github логотип

GHSA-8348-4394-v2hm

почти 4 года назад

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

EPSS: Средний
github логотип

GHSA-q9q3-j7rw-3j95

почти 4 года назад

The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.

EPSS: Низкий
github логотип

GHSA-389j-qw4x-m76h

почти 4 года назад

Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php.

EPSS: Низкий
github логотип

GHSA-r7cj-2ghq-wj88

почти 4 года назад

jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.

EPSS: Низкий
github логотип

GHSA-5xqf-3mwv-q7gm

почти 4 года назад

Multiple unknown vulnerabilities in Moodle before 1.5.1 have unknown impact and attack vectors.

EPSS: Низкий
github логотип

GHSA-6q9g-3vfq-q2qj

почти 4 года назад

Improper Authentication in moodle

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-c5hf-mc85-2hx4

почти 4 года назад

Missing authorization in Moodle

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2022-0984

почти 4 года назад

Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-4r9p-m9h5-r8vm

Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php.

0%
Низкий
почти 4 года назад
github логотип
GHSA-w979-xjw9-2g82

Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups.

0%
Низкий
почти 4 года назад
github логотип
GHSA-8348-4394-v2hm

Dynamic code evaluation vulnerability in tests/tmssql.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PhpOpenChat, possibly (7) MAXdev MD-Pro, and (8) Simplog, allows remote attackers to execute arbitrary PHP functions via the do parameter, which is saved in a variable that is then executed as a function, as demonstrated using phpinfo.

21%
Средний
почти 4 года назад
github логотип
GHSA-q9q3-j7rw-3j95

The server.php test script in ADOdb for PHP before 4.70, as used in multiple products including (1) Mantis, (2) PostNuke, (3) Moodle, (4) Cacti, (5) Xaraya, (6) PHPOpenChat, (7) MAXdev MD-Pro, and (8) MediaBeez, when the MySQL root password is empty, allows remote attackers to execute arbitrary SQL commands via the sql parameter.

8%
Низкий
почти 4 года назад
github логотип
GHSA-389j-qw4x-m76h

Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php.

1%
Низкий
почти 4 года назад
github логотип
GHSA-r7cj-2ghq-wj88

jumpto.php in Moodle 1.5.2 allows remote attackers to redirect users to other sites via the jump parameter.

8%
Низкий
почти 4 года назад
github логотип
GHSA-5xqf-3mwv-q7gm

Multiple unknown vulnerabilities in Moodle before 1.5.1 have unknown impact and attack vectors.

0%
Низкий
почти 4 года назад
github логотип
GHSA-6q9g-3vfq-q2qj

Improper Authentication in moodle

CVSS3: 4.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-c5hf-mc85-2hx4

Missing authorization in Moodle

CVSS3: 4.3
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2022-0984

Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges.

CVSS3: 4.3
0%
Низкий
почти 4 года назад

Уязвимостей на страницу


Поделиться