Логотип exploitDog
product: "moodle"
Консоль
Логотип exploitDog

exploitDog

product: "moodle"
Moodle

Moodleсистема управления образовательными электронными курсами

Релизный цикл, информация об уязвимостях

Продукт: Moodle
Вендор: moodle

График релизов

4.55.05.120242025202620272028

Недавние уязвимости Moodle

Количество 2 647

debian логотип

CVE-2023-28330

почти 3 года назад

Insufficient sanitizing in backup resulted in an arbitrary file read r ...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-28329

почти 3 года назад

Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2023-28329

почти 3 года назад

Insufficient validation of profile field availability condition result ...

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2023-1402

почти 3 года назад

The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2023-1402

почти 3 года назад

The course participation report required additional checks to prevent ...

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2023-28332

почти 3 года назад

If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2023-28336

почти 3 года назад

Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2023-28334

почти 3 года назад

Authenticated users were able to enumerate other users' names via the learning plans page.

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2023-28335

почти 3 года назад

The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk.

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2023-28331

почти 3 года назад

Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2023-28330

Insufficient sanitizing in backup resulted in an arbitrary file read r ...

CVSS3: 6.5
1%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-28329

Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).

CVSS3: 8.8
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-28329

Insufficient validation of profile field availability condition result ...

CVSS3: 8.8
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-1402

The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.

CVSS3: 4.3
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-1402

The course participation report required additional checks to prevent ...

CVSS3: 4.3
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2023-28332

If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.

CVSS3: 6.1
1%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2023-28336

Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.

CVSS3: 4.3
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2023-28334

Authenticated users were able to enumerate other users' names via the learning plans page.

CVSS3: 4.3
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2023-28335

The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk.

CVSS3: 8.8
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2023-28331

Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.

CVSS3: 6.1
1%
Низкий
почти 3 года назад

Уязвимостей на страницу


Поделиться