Moodle — система управления образовательными электронными курсами
Релизный цикл, информация об уязвимостях
График релизов
Количество 2 470
CVE-2024-34003
In a shared hosting environment that has been misconfigured to allow a ...

CVE-2024-34002
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
CVE-2024-34002
In a shared hosting environment that has been misconfigured to allow a ...

CVE-2024-34003
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include.

CVE-2024-34007
The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF.

CVE-2024-34006
The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered.

CVE-2024-34004
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.

CVE-2024-34008
Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk.

CVE-2024-34002
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include.

CVE-2024-34009
Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
CVE-2024-34003 In a shared hosting environment that has been misconfigured to allow a ... | CVSS3: 5.9 | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-34002 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
CVE-2024-34002 In a shared hosting environment that has been misconfigured to allow a ... | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-34003 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include. | CVSS3: 5.9 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-34007 The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF. | CVSS3: 8.8 | 1% Низкий | около 1 года назад |
![]() | CVE-2024-34006 The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered. | CVSS3: 4.3 | 1% Низкий | около 1 года назад |
![]() | CVE-2024-34004 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-34008 Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk. | CVSS3: 8.8 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-34002 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-34009 Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized. | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу