Filtered by vendor Moodle
Subscriptions
Filtered by product Moodle
Subscriptions
Total
547 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-36398 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.4 Medium |
In moodle, ID numbers displayed in the web service token list required additional sanitizing to prevent a stored XSS risk. | ||||
CVE-2021-36397 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.3 Medium |
In Moodle, insufficient capability checks meant message deletions were not limited to the current user. | ||||
CVE-2021-36396 | 1 Moodle | 1 Moodle | 2024-11-21 | 7.5 High |
In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk. | ||||
CVE-2021-36395 | 1 Moodle | 1 Moodle | 2024-11-21 | 7.5 High |
In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service. | ||||
CVE-2021-36394 | 1 Moodle | 1 Moodle | 2024-11-21 | 9.8 Critical |
In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin. | ||||
CVE-2021-36393 | 1 Moodle | 1 Moodle | 2024-11-21 | 9.8 Critical |
In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses. | ||||
CVE-2021-36392 | 1 Moodle | 1 Moodle | 2024-11-21 | 9.8 Critical |
In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses. | ||||
CVE-2021-32478 | 1 Moodle | 1 Moodle | 2024-11-21 | 6.1 Medium |
The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected. | ||||
CVE-2021-32477 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.3 Medium |
The last time a user accessed the mobile app is displayed on their profile page, but should be restricted to users with the relevant capability (site administrators by default). Moodle versions 3.10 to 3.10.3 are affected. | ||||
CVE-2021-32476 | 1 Moodle | 1 Moodle | 2024-11-21 | 7.5 High |
A denial-of-service risk was identified in the draft files area, due to it not respecting user file upload limits. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. | ||||
CVE-2021-32475 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.4 Medium |
ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. | ||||
CVE-2021-32474 | 1 Moodle | 1 Moodle | 2024-11-21 | 7.2 High |
An SQL injection risk existed on sites with MNet enabled and configured, via an XML-RPC call from the connected peer host. Note that this required site administrator access or access to the keypair. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. | ||||
CVE-2021-32473 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.3 Medium |
It was possible for a student to view their quiz grade before it had been released, using a quiz web service. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected | ||||
CVE-2021-32472 | 1 Moodle | 1 Moodle | 2024-11-21 | 4.3 Medium |
Teachers exporting a forum in CSV format could receive a CSV of forums from all courses in some circumstances. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6 and 3.8 to 3.8.8 are affected. | ||||
CVE-2021-32244 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.4 Medium |
Cross Site Scripting (XSS) in Moodle 3.10.3 allows remote attackers to execute arbitrary web script or HTML via the "Description" field. | ||||
CVE-2021-27131 | 1 Moodle | 1 Moodle | 2024-11-21 | 5.4 Medium |
Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the "Additional HTML Section" via "Header and Footer" parameter in /admin/settings.php. This vulnerability is leading an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer. NOTE: this is disputed by the vendor because the "Additional HTML Section" for "Header and Footer" can only be supplied by an administrator, who is intentionally allowed to enter unsanitized input (e.g., site-specific JavaScript). | ||||
CVE-2021-21809 | 1 Moodle | 1 Moodle | 2024-11-21 | 9.1 Critical |
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities. | ||||
CVE-2021-20283 | 2 Fedoraproject, Moodle | 2 Fedora, Moodle | 2024-11-21 | 4.3 Medium |
The web service responsible for fetching other users' enrolled courses did not validate that the requesting user had permission to view that information in each course in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | ||||
CVE-2021-20282 | 2 Fedoraproject, Moodle | 2 Fedora, Moodle | 2024-11-21 | 5.3 Medium |
When creating a user account, it was possible to verify the account without having access to the verification email link/secret in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | ||||
CVE-2021-20281 | 2 Fedoraproject, Moodle | 2 Fedora, Moodle | 2024-11-21 | 5.3 Medium |
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. |