Total
512 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-0123 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in install.php for Moodle 1.8.3, and possibly other versions before 1.8.4, allows remote attackers to inject arbitrary web script or HTML via the dbname parameter. NOTE: this issue only exists until the installation is complete. | |||||
CVE-2007-6538 | 2 Moodle, Mrbs | 2 Moodle, Mrbs | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in ing/blocks/mrbs/code/web/view_entry.php in the MRBS plugin for Moodle allows remote attackers to execute arbitrary SQL commands via the id parameter. | |||||
CVE-2007-3555 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in index.php in Moodle 1.7.1 allows remote attackers to inject arbitrary web script or HTML via a style expression in the search parameter, a different vulnerability than CVE-2004-1424. | |||||
CVE-2007-1647 | 1 Moodle | 1 Moodle | 2024-11-21 | 7.8 HIGH | N/A |
Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/. | |||||
CVE-2007-1429 | 1 Moodle | 1 Moodle | 2024-11-21 | 7.5 HIGH | N/A |
Multiple PHP remote file inclusion vulnerabilities in Moodle 1.7.1 allow remote attackers to execute arbitrary PHP code via a URL in the cmd parameter to (1) admin/utfdbmigrate.php or (2) filter.php. | |||||
CVE-2006-6626 | 1 Moodle | 1 Moodle | 2024-11-21 | 6.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in an unspecified component of Moodle 1.5 allows remote attackers to inject arbitrary web script or HTML via a javascript URI in the SRC attribute of an IMG element. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. NOTE: It is unclear whether this candidate overlaps CVE-2006-4784 or CVE-2006-4941. | |||||
CVE-2006-6625 | 1 Moodle | 1 Moodle | 2024-11-21 | 6.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in mod/forum/discuss.php in Moodle 1.6.1 allows remote attackers to inject arbitrary web script or HTML via the navtail parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2006-5219 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.1 MEDIUM | N/A |
SQL injection vulnerability in blog/index.php in the blog module in Moodle 1.6.2 allows remote attackers to execute arbitrary SQL commands via a double-encoded tag parameter. | |||||
CVE-2006-4943 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.0 MEDIUM | N/A |
course/jumpto.php in Moodle before 1.6.2 does not validate the session key (sesskey) before providing content from arbitrary local URIs, which allows remote attackers to obtain sensitive information via the jump parameter. | |||||
CVE-2006-4942 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.6 MEDIUM | N/A |
Moodle before 1.6.2, when the configuration lacks (1) algebra or (2) tex filters, allows remote authenticated users to write LaTeX or MimeTeX output files to the top level of the dataroot directory via (a) filter/algebra/pix.php or (b) filter/tex/pix.php. | |||||
CVE-2006-4941 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Moodle before 1.6.2 might allow remote attackers to inject arbitrary web script or HTML via (1) the choose parameter in files/index.php and (2) the sub parameter in doc/index.php. | |||||
CVE-2006-4940 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.0 MEDIUM | N/A |
login/forgot_password.php in Moodle before 1.6.2 allows remote attackers to obtain sensitive information (e-mail addresses and Moodle account names) via a find action. | |||||
CVE-2006-4939 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.0 MEDIUM | N/A |
backup/backup_scheduled.php in Moodle before 1.6.2 generates trace data with the full backup pathname even when debugging is disabled, which might allow attackers to obtain the pathname. | |||||
CVE-2006-4938 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.0 MEDIUM | N/A |
help.php in Moodle before 1.6.2 does not check the existence of certain help files before including them, which might allow remote authenticated users to obtain the path in an error message. | |||||
CVE-2006-4937 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.0 MEDIUM | N/A |
lib/setup.php in Moodle before 1.6.2 sets the error reporting level to 7 to display E_WARNING messages to users even if debugging is disabled, which might allow remote authenticated users to obtain sensitive information by triggering the messages. | |||||
CVE-2006-4936 | 1 Moodle | 1 Moodle | 2024-11-21 | 10.0 HIGH | N/A |
Moodle before 1.6.2 does not properly validate the module instance id when creating a course module object, which has unspecified impact and remote attack vectors. | |||||
CVE-2006-4935 | 1 Moodle | 1 Moodle | 2024-11-21 | 10.0 HIGH | N/A |
The Database module in Moodle before 1.6.2 does not properly handle uploaded files, which has unspecified impact and remote attack vectors. | |||||
CVE-2006-4786 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.0 MEDIUM | N/A |
Moodle 1.6.1 and earlier allows remote attackers to obtain sensitive information via (1) help.php and (2) other unspecified vectors involving scheduled backups. | |||||
CVE-2006-4785 | 1 Moodle | 1 Moodle | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in blog/edit.php in Moodle 1.6.1 and earlier allows remote attackers to execute arbitrary SQL commands via the format parameter as stored in the $blogEntry variable, which is not properly handled by the insert_record function, which calls _adodb_column_sql in the adodb layer (lib/adodb/adodb-lib.inc.php), which does not convert the data type to an int. | |||||
CVE-2006-4784 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Moodle 1.6.1 and earlier might allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) doc/index.php or (2) files/index.php. |