Логотип exploitDog
product: "moodle"
Консоль
Логотип exploitDog

exploitDog

product: "moodle"
Moodle

Moodleсистема управления образовательными электронными курсами

Релизный цикл, информация об уязвимостях

Продукт: Moodle
Вендор: moodle

График релизов

4.14.24.34.44.55.02022202320242025202620272028

Недавние уязвимости Moodle

Количество 2 536

github логотип

GHSA-j3x5-cwfj-pfcw

больше 3 лет назад

Moodle does not force password changes for autosubscribed users

EPSS: Низкий
github логотип

GHSA-mx5g-3vxh-rgm8

больше 3 лет назад

Moodle vulnerable to XSS via bundled spikephpcoverage library

EPSS: Низкий
github логотип

GHSA-mw6p-49jf-9935

больше 3 лет назад

Moodle allows remote attackers to obtain sensitive information from myprofile block by visiting user-context page

EPSS: Низкий
github логотип

GHSA-p269-r9cq-frhv

больше 3 лет назад

Moodle 2.0.x before 2.0.7 and 2.1.x before 2.1.4, when an anonymous front-page forum is enabled, allows remote attackers to obtain session keys for their sessions by visiting the front page.

EPSS: Низкий
github логотип

GHSA-phqj-xp48-7p7c

больше 3 лет назад

Moodle does not use the forceloginforprofiles setting for course-profiles access control

EPSS: Низкий
github логотип

GHSA-4r4x-49qh-hfgv

больше 3 лет назад

Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 displays web service tokens associated with (1) disabled services and (2) users who no longer have authorization, which allows remote authenticated users to have an unspecified impact by reading these tokens.

EPSS: Низкий
github логотип

GHSA-qm6h-hvwq-4xp6

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in blog/lib.php in the blog implementation in Moodle 1.9.x before 1.9.18, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via a crafted parameter to blog/index.php.

EPSS: Низкий
github логотип

GHSA-4fm4-pcw7-99hg

больше 3 лет назад

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

EPSS: Низкий
github логотип

GHSA-6q96-wmxp-mc79

больше 3 лет назад

backup/moodle2/restore_stepslib.php in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not check for the moodle/course:changeidnumber privilege during handling of course ID numbers, which allows remote authenticated users to overwrite ID numbers via a restore action.

EPSS: Низкий
github логотип

GHSA-m97f-x4mr-4x3q

больше 3 лет назад

Moodle vulnerable to Cross-Site Request Forgery

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-j3x5-cwfj-pfcw

Moodle does not force password changes for autosubscribed users

0%
Низкий
больше 3 лет назад
github логотип
GHSA-mx5g-3vxh-rgm8

Moodle vulnerable to XSS via bundled spikephpcoverage library

3%
Низкий
больше 3 лет назад
github логотип
GHSA-mw6p-49jf-9935

Moodle allows remote attackers to obtain sensitive information from myprofile block by visiting user-context page

0%
Низкий
больше 3 лет назад
github логотип
GHSA-p269-r9cq-frhv

Moodle 2.0.x before 2.0.7 and 2.1.x before 2.1.4, when an anonymous front-page forum is enabled, allows remote attackers to obtain session keys for their sessions by visiting the front page.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-phqj-xp48-7p7c

Moodle does not use the forceloginforprofiles setting for course-profiles access control

0%
Низкий
больше 3 лет назад
github логотип
GHSA-4r4x-49qh-hfgv

Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 displays web service tokens associated with (1) disabled services and (2) users who no longer have authorization, which allows remote authenticated users to have an unspecified impact by reading these tokens.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-qm6h-hvwq-4xp6

Cross-site scripting (XSS) vulnerability in blog/lib.php in the blog implementation in Moodle 1.9.x before 1.9.18, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via a crafted parameter to blog/index.php.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-4fm4-pcw7-99hg

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-6q96-wmxp-mc79

backup/moodle2/restore_stepslib.php in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not check for the moodle/course:changeidnumber privilege during handling of course ID numbers, which allows remote authenticated users to overwrite ID numbers via a restore action.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-m97f-x4mr-4x3q

Moodle vulnerable to Cross-Site Request Forgery

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться