Version v4.5.0

moodle/moodle

Helps running Moodle plugins analysis checks and tests under various CI environments.

Install Instructions

composer require moodle/moodle
Current Version Release Date November 06, 2024
Language PHP

Find moodle/moodle vulnerabilities in your supply chain.

Scan for Free

moodle/moodle Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2006-4936 High 10 CWE-20 0.00262 0.65083
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2008-1502 Medium 4.3 CWE-79 0.02875 0.90484
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2010-2230 Medium 4 CWE-79 0.00191 0.56682
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2011-4203 Medium 5 CWE-94 0.00179 0.55276
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2011-4278 Medium 4.3 CWE-79 0.00192 0.56783
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2011-4294 Medium 5.8 CWE-20 0.00155 0.52226
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2011-4301 Medium 5 0.00329 0.706
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2011-4306 Medium 4.3 CWE-79 0.00192 0.56783
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2012-1157 Medium 4.3 CWE-276 0.00176 0.54894
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2012-1159 Medium 4.3 CWE-200 0.00202 0.57847
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-1830 Medium 5 CWE-264 0.00364 0.72053
  • v2.3.4–v2.4.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-1831 Medium 5 CWE-200 0.00525 0.76788
  • v2.3.4–v2.4.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-2080 Medium 4 CWE-264 0.00212 0.58726
  • v2.3.4–v2.4.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-2081 Medium 4.3 CWE-264 0.00275 0.67688
  • v2.3.4–v2.4.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-2082 Medium 5 CWE-264 0.00597 0.78234
  • v2.3.4–v2.4.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-2083 Medium 5 CWE-20 0.00486 0.75713
  • v2.3.4–v2.4.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-3630 Medium 4.6 CWE-94 0.02291 0.89337
  • v2.3.4–v2.5.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-7341 Medium 4.3 CWE-79 0.00254 0.64434
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0122 Medium 4.9 CWE-264 0.00121 0.46971
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0123 Medium 4.9 CWE-264 0.00124 0.47398
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0124 Medium 4 CWE-264 0.00124 0.47398
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0125 Medium 5.8 CWE-264 0.00253 0.64299
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0126 Medium 6.8 CWE-352 0.00157 0.52496
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0127 Medium 4.9 CWE-264 0.00121 0.46971
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0213 Medium 6.8 CWE-352 0.00157 0.52496
  • v2.3.4–v2.6.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0214 Medium 6.8 CWE-287 0.00624 0.78756
  • v2.3.4–v2.6.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0216 Medium 5 CWE-264 0.00289 0.68505
  • v2.3.4–v2.6.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-0218 Medium 4.3 CWE-79 0.0022 0.59674
  • v2.3.4–v2.6.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-2571 Low 3.5 CWE-79 0.00093 0.4067
  • v2.3.4–v2.6.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3541 High 7.5 CWE-94 0.0228 0.89299
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3542 Medium 4.3 CWE-200 0.00313 0.69772
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3543 Medium 4.3 CWE-200 0.00313 0.69772
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3544 Low 3.5 CWE-79 0.01115 0.84304
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3546 Medium 5 CWE-264 0.00289 0.68505
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3548 Medium 4.3 CWE-79 0.0022 0.59674
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3551 Low 3.5 CWE-79 0.00102 0.42713
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3553 Medium 4.9 CWE-264 0.00117 0.46295
  • v2.3.4–v2.7.0
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-3617 Medium 4 CWE-264 0.00112 0.45192
  • v2.3.4–v2.7.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7830 Low 3.5 CWE-79 0.00131 0.48509
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7832 Medium 4 CWE-264 0.00144 0.50725
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7833 Medium 4 CWE-200 0.0016 0.52979
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7836 Medium 6.8 CWE-352 0.00157 0.52606
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7837 Medium 5.5 CWE-264 0.00206 0.58216
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7838 Medium 6.8 CWE-352 0.00157 0.52606
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7846 Medium 4 CWE-264 0.00122 0.47127
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-7847 Medium 5 CWE-399 0.0076 0.80954
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-9059 Medium 4.3 CWE-79 0.00369 0.72235
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2014-9060 Medium 5 CWE-20 0.00358 0.71854
  • v2.3.4–v2.7.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-0211 Medium 4 CWE-200 0.00124 0.47398
  • v2.3.4–v2.8.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-0212 Low 3.5 CWE-79 0.00093 0.4067
  • v2.3.4–v2.8.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-0213 Medium 6.8 CWE-352 0.00157 0.52496
  • v2.3.4–v2.8.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-0214 Medium 4 CWE-264 0.00112 0.45192
  • v2.3.4–v2.8.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-0215 Medium 4 CWE-200 0.00124 0.47398
  • v2.3.4–v2.8.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-0217 Medium 6.8 CWE-399 0.00245 0.63714
  • v2.3.4–v2.8.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-0218 Medium 6.8 CWE-352 0.00157 0.52496
  • v2.3.4–v2.8.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-1493 Medium 6.8 CWE-22 0.00177 0.54943
  • v2.3.4–v2.8.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2266 Medium 4 CWE-200 0.00124 0.47398
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2267 Medium 4 CWE-284 0.00112 0.45192
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2268 Medium 6.8 CWE-399 0.00245 0.63714
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2269 Low 3.5 CWE-79 0.00178 0.55133
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2270 Medium 4.3 CWE-17 0.00313 0.69772
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2271 Medium 4 CWE-264 0.00112 0.45192
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2272 Medium 4 CWE-264 0.00144 0.50725
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-2273 Low 3.5 CWE-79 0.00093 0.4067
  • v2.3.4–v2.8.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-3174 Low 3.5 CWE-79 0.00169 0.54164
  • v2.3.4–v2.8.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-3175 Medium 5.8 CWE-601 0.00348 0.71458
  • v2.3.4–v2.8.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-3176 Medium 4.3 CWE-200 0.00555 0.77438
  • v2.3.4–v2.8.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-3178 Low 3.5 CWE-79 0.00131 0.48509
  • v2.3.4–v2.8.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-3179 Low 3.5 CWE-264 0.00188 0.56338
  • v2.3.4–v2.8.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-3180 Medium 4 CWE-200 0.0021 0.58567
  • v2.3.4–v2.8.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-3181 Medium 4 CWE-264 0.00145 0.50895
  • v2.3.4–v2.8.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5267 High 7.5 CWE-254, CWE-200 0.0034 0.71124
  • v2.3.4–v2.9.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5268 Medium 4.3 CWE-264, CWE-200 0.00152 0.5189
  • v2.3.4–v2.9.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5269 Medium 5.4 CWE-79 0.00114 0.45534
  • v2.3.4–v2.9.1
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5335 Medium 4.3 CWE-200, CWE-352 0.00078 0.35543
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5336 Medium 5.4 CWE-79 0.00065 0.30402
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5337 Medium 6.1 CWE-79 0.00125 0.47568
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5338 High 8.8 CWE-352 0.0009 0.39756
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5339 Medium 4.3 CWE-264, CWE-200 0.00081 0.36693
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5340 Medium 4.3 CWE-264, CWE-200 0.00081 0.36693
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5341 Medium 4.3 CWE-264, CWE-200 0.00081 0.36693
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2015-5342 Medium 4.3 CWE-264 0.00081 0.36693
  • v2.3.4–v2.9.2
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-0724 Medium 4.3 CWE-264, CWE-200 0.00208 0.58482
  • v3.0.0–v3.0.1
  • v2.3.4–v2.9.3
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-2151 Medium 4.3 CWE-200 0.00152 0.5189
  • v3.0.0–v3.0.2
  • v2.3.4–v2.9.4
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-2156 Medium 4.3 CWE-200 0.00152 0.5189
  • v3.0.0–v3.0.2
  • v2.3.4–v2.9.4
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-2157 High 8.8 CWE-352 0.00157 0.52606
  • v3.0.0–v3.0.2
  • v2.3.4–v2.9.4
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-2158 Medium 4.3 CWE-200 0.00176 0.54837
  • v3.0.0–v3.0.2
  • v2.3.4–v2.9.4
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-2190 Medium 5.3 CWE-264 0.00314 0.69863
  • v3.0.0–v3.0.2
  • v2.3.4–v2.9.4
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-3734 High 8.8 CWE-352 0.00166 0.53744
  • v3.0.0–v3.0.3
  • v2.3.4–v2.9.5
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-9187 High 8.8 CWE-434 0.00795 0.8139
  • v4.0.0–v4.5.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2016-9188 Medium 6.1 CWE-79 0.00125 0.47585
  • v4.0.0–v4.5.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2017-12156 Medium 6.1 CWE-79 0.00061 0.27887
  • v3.0.0–v3.3.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2017-12157 Medium 4.3 CWE-200 0.00049 0.20145
  • v3.0.0–v3.3.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2017-7531 Medium 4.3 CWE-200 0.00049 0.20145
  • v3.0.0–v3.3.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2017-7532 Medium 6.5 CWE-269 0.00054 0.23755
  • v3.0.0–v3.3.0
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2018-10889 Medium 4.3 CWE-532 0.00142 0.50448
  • v3.0.0–v3.5.0
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2018-10890 Medium 4.3 CWE-200 0.00142 0.50448
  • v3.0.0–v3.5.0
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2018-1133 High 8.8 CWE-74, CWE-94 0.5476 0.97759
  • v3.0.0–v3.4.2
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2018-1134 Medium 6.5 CWE-269 0.00059 0.26547
  • v3.0.0–v3.4.2
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2018-1137 High 8.1 CWE-20 0.00081 0.36635
  • v3.0.0–v3.4.2
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2018-14630 High 8.8 CWE-20, CWE-94 0.01757 0.87641
  • v3.0.0–v3.5.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2018-14631 High 8.8 CWE-20, CWE-79 0.00116 0.46229
  • v3.0.0–v3.5.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-10133 Low 3.1 CWE-601 0.00075 0.3476
  • v3.0.0–v3.6.3
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-10188 Medium 4.3 CWE-284 0.00114 0.45552
  • v3.0.0–v3.7.0
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-10189 Medium 4.3 CWE-284 0.00114 0.45552
  • v3.0.0–v3.7.0
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-14827 Medium 6.1 CWE-94 0.00085 0.37709
  • v3.0.0–v3.7.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-18210 Medium 5.4 CWE-79 0.0005 0.21439
  • v4.0.0–v4.5.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-3808 Medium 5.4 CWE-79 0.00058 0.26321
  • v3.0.0–v3.6.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-3847 Medium 4.8 CWE-20, CWE-285, CWE-79 0.00062 0.2844
  • v3.0.0–v3.6.2
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-3849 High 8.8 CWE-285, CWE-264, CWE-269 0.00108 0.44486
  • v3.0.0–v3.6.2
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2019-3852 Medium 4.3 CWE-264 0.00057 0.25745
  • v3.0.0–v3.6.2
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2020-1692 High 8.1 CWE-200, CWE-352 0.00058 0.26285
  • v3.0.0–v3.7.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2020-25629 High 8.8 CWE-284, CWE-862 0.00104 0.43469
  • v3.0.0–v3.9.0
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2020-25630 High 7.5 CWE-400 0.00103 0.43272
  • v3.0.0–v3.9.0
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-20279 Medium 5.4 CWE-79 0.00077 0.35167
  • v3.0.0–v3.10.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-20282 Medium 5.3 CWE-863 0.00095 0.41248
  • v3.0.0–v3.10.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-20283 Medium 4.3 CWE-863, CWE-862 0.00067 0.31546
  • v3.0.0–v3.10.1
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-27131 Medium 5.4 CWE-79 0.00067 0.31591
  • v4.0.0–v4.5.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36392 High 9.8 CWE-89 0.00142 0.50427
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36393 High 9.8 CWE-89 0.00142 0.50427
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36394 High 9.8 CWE-384 0.00457 0.74975
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36395 High 7.5 CWE-674 0.00086 0.38373
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36396 High 7.5 CWE-918 0.00073 0.34049
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36397 Medium 5.3 CWE-276 0.00072 0.33526
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36399 Medium 5.4 CWE-79 0.00054 0.25116
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36400 Medium 5.3 CWE-639 0.00072 0.33526
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36401 Medium 4.8 CWE-79 0.00044 0.14307
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36402 Medium 5.3 CWE-20 0.00072 0.33526
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36403 Medium 5.3 CWE-912 0.00072 0.33526
  • v3.0.0–v3.11.0-beta
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2021-36568 Medium 5.4 CWE-79 0.00113 0.4548
  • v3.0.0–v3.11.9
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2022-0334 Medium 4.3 CWE-668, CWE-863 0.0005 0.21439
  • v3.0.0–v3.11.4
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2022-0983 High 8.8 CWE-89 0.00104 0.43559
  • v3.0.0–v3.11.5
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2022-0984 Medium 4.3 CWE-863 0.0005 0.21439
  • v3.0.0–v3.11.5
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2022-40208 Medium 4.3 CWE-285 0.00054 0.25116
  • v4.0.0–v4.0.2
  • v3.0.0–v3.11.8
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2022-40314 High 9.8 0.00458 0.75019
  • v4.0.0–v4.0.3
  • v3.0.0–v3.11.9
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-1402 Medium 4.3 CWE-668, CWE-200 0.00084 0.37508
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-23921 Medium 6.1 CWE-79 0.00098 0.41737
  • v4.0.0–v4.1.0-beta
  • v3.0.0–v3.11.11
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-23923 High 8.2 CWE-284 0.00225 0.60306
  • v4.0.0–v4.1.0-beta
  • v3.0.0–v3.11.11
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-28329 High 8.8 CWE-89 0.00197 0.574
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-28330 Medium 6.5 CWE-20, CWE-22 0.0012 0.46677
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-28331 Medium 6.1 CWE-79 0.00098 0.41925
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-28332 Medium 6.1 CWE-79 0.00074 0.34109
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-28333 High 9.8 CWE-94 0.00503 0.76206
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-28334 Medium 4.3 CWE-639, CWE-200 0.00054 0.25116
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-28336 Medium 4.3 CWE-668, CWE-200 0.00084 0.37508
  • v4.0.0–v4.1.1
  • v3.0.0–v3.11.12
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-30943 Medium 5.3 CWE-610, CWE-73 0.01475 0.86478
  • v4.0.0–v4.2.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-30944 High 7.3 CWE-89 0.00307 0.69503
  • v4.0.0–v4.2.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-35131 Medium 6.1 CWE-79 0.00097 0.41552
  • v4.0.0–v4.2.0
  • v3.0.0–v3.11.14
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-35132 Medium 6.3 CWE-89 0.00075 0.34696
  • v4.0.0–v4.2.0
  • v3.0.0–v3.11.14
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-35133 High 7.5 CWE-918 0.00104 0.43349
  • v4.0.0–v4.2.0
  • v3.0.0–v3.11.14
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5539 High 8.8 CWE-94 0.00377 0.72515
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5540 High 8.8 CWE-94 0.00377 0.72515
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5541 Medium 6.1 CWE-79 0.00079 0.36184
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5542 Medium 4.3 CWE-668, CWE-284 0.00059 0.26785
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5544 Medium 5.4 CWE-639, CWE-79 0.0013 0.48352
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5545 Medium 5.3 CWE-668, CWE-200 0.00079 0.36146
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5546 Medium 5.4 CWE-79 0.00064 0.29953
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5547 Medium 6.1 CWE-79 0.00079 0.36184
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5548 Medium 5.3 CWE-349, CWE-345 0.00063 0.29223
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5549 Medium 5.3 CWE-284, CWE-269 0.00063 0.29223
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5550 High 9.8 CWE-94 0.00659 0.79464
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.16
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2023-5551 Low 3.3 CWE-200 0.00045 0.1735
  • v4.0.0–v4.3.0-beta
  • v3.0.0–v3.11.16
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-1439 Low 3.3 CWE-284 0.00043 0.10859
  • v4.0.0–v4.2.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-25978 High 7.5 CWE-400 0.00045 0.1735
  • v4.0.0–v4.3.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-25979 Medium 5.3 CWE-233 0.00045 0.1735
  • v4.0.0–v4.3.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-25980 Medium 4.3 CWE-284 0.00045 0.1735
  • v4.0.0–v4.3.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-25981 Medium 4.3 CWE-284 0.00045 0.1735
  • v4.0.0–v4.3.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-25982 Medium 4.3 CWE-352 0.00045 0.1735
  • v4.0.0–v4.3.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-25983 Low 3.5 CWE-639 0.00045 0.1735
  • v4.0.0–v4.3.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-28593 Medium 5.4 CWE-94 0.00045 0.1735
  • v4.0.0–v4.5.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-29374 Medium 6.1 CWE-79 0.00043 0.10859
  • v4.0.0–v4.5.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-33996 Medium 6.2 CWE-20 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-33997 Unknown CWE-79 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-33998 Unknown CWE-79 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34000 Medium 4.3 CWE-79 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34001 High 8.4 CWE-352 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34002 Medium 6.5 CWE-200 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34003 Medium 5.9 CWE-200 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34004 Unknown CWE-200 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34005 Medium 6.5 CWE-200 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34006 Medium 4.3 CWE-838 0.00043 0.10859
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-34008 High 8.8 CWE-352 0.00058 0.26138
  • v4.0.0–v4.3.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-38273 Medium 5.4 CWE-284 0.00045 0.1735
  • v4.0.0–v4.4.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-38274 Medium 6.1 CWE-79 0.00045 0.1735
  • v4.0.0–v4.4.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-38275 High 7.5 CWE-226 0.00043 0.10859
  • v4.0.0–v4.4.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-38276 High 8.8 CWE-352 0.00062 0.28454
  • v4.0.0–v4.4.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-38277 Medium 5.4 CWE-324, CWE-326 0.00045 0.1735
  • v4.0.0–v4.4.0-beta
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43425 High 8.1 CWE-94 0.00277 0.67805
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43426 High 7.5 CWE-20 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43427 Low 3.7 CWE-922 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43428 High 7.7 CWE-20 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43429 Medium 5.3 CWE-312 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43431 High 7.5 CWE-862 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43432 Medium 5.3 CWE-319 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43434 High 8.1 CWE-22 0.00044 0.1207
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43435 Medium 5.3 CWE-754 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43436 High 7.2 CWE-89 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43437 Medium 5.4 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43438 High 7.5 CWE-639 0.00043 0.10859
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-43440 High 7.5 CWE-22 0.00044 0.1207
  • v4.0.0–v4.4.1
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-45689 Medium 6.5 CWE-200 0.00043 0.10859
  • v4.0.0–v4.4.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-45690 Unknown CWE-284 0.00043 0.10859
  • v4.0.0–v4.4.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-45691 Medium 5.4 CWE-287 0.00043 0.10859
  • v4.0.0–v4.4.2
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-48896 Medium 4.3 CWE-209 0.00045 0.1561
  • v4.0.0–v4.4.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-48897 Medium 4.3 CWE-863, CWE-285 0.00045 0.1561
  • v4.0.0–v4.4.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-48898 Medium 4.3 CWE-862 0.00045 0.1561
  • v4.0.0–v4.4.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2024-48901 Medium 4.3 CWE-863, CWE-285 0.00045 0.1561
  • v4.0.0–v4.4.3
  • v3.0.0–v3.11.18
  • v2.3.4–v2.9.9
  • dev-MOODLE_34_STABLE
  • dev-MOODLE_33_STABLE
  • dev-MOODLE_32_STABLE
  • dev-MOODLE_31_STABLE
  • dev-MOODLE_30_STABLE
  • dev-MOODLE_29_STABLE
  • dev-MOODLE_28_STABLE
  • dev-MOODLE_27_STABLE
  • dev-MOODLE_26_STABLE
  • dev-MOODLE_25_STABLE
  • dev-MOODLE_24_STABLE
  • dev-MOODLE_23_STABLE
CVE-2013-1832 Medium 4 CWE-200 0.00133 0.49103
  • v2.3.4–v2.4.1
CVE-2013-1833 Low 3.5 CWE-79 0.00108 0.44543
  • v2.3.4–v2.4.1
CVE-2013-1834 Medium 4 CWE-264 0.00174 0.54666
  • v2.3.4–v2.4.1
CVE-2013-1835 Low 3.5 CWE-200 0.00174 0.54666
  • v2.3.4–v2.4.1
CVE-2013-1836 Medium 6.5 CWE-264 0.00301 0.69186
  • v2.3.4–v2.4.1
CVE-2014-0215 Medium 4 CWE-200 0.00124 0.47398
  • v2.4.0–v2.7.0-beta
CVE-2014-3545 Medium 6 CWE-94 0.00497 0.76018
  • v2.4.0–v2.7.0
CVE-2012-6099 Medium 4 CWE-20 0.00116 0.46173
  • v2.4.0
CVE-2012-6112 Medium 5 CWE-264 0.00681 0.79801
  • v2.4.0
CVE-2014-0129 Medium 4 CWE-264 0.00124 0.47398
  • v2.5.0–v2.6.1
CVE-2014-0217 Medium 4.3 CWE-200 0.00313 0.69772
  • v2.6.0–v2.6.2
CVE-2014-2572 Medium 4 CWE-264 0.00124 0.47398
  • v2.6.0–v2.6.1
CVE-2014-3547 Medium 4.3 CWE-79 0.0022 0.59674
  • v2.5.0–v2.7.0
CVE-2014-7834 Medium 4 CWE-264 0.0016 0.52979
  • v2.6.0–v2.7.2
CVE-2014-7835 Low 2.1 CWE-79 0.0012 0.46684
  • v2.6.0–v2.7.2
CVE-2014-7845 High 7.5 CWE-255 0.00651 0.7932
  • v2.5.0–v2.7.2
CVE-2014-7848 Medium 5 CWE-200 0.00358 0.71854
  • v2.6.0–v2.7.2
CVE-2015-3272 High 7.4 0.003 0.69162
  • v2.7.0–v2.9.0
CVE-2015-3274 Medium 6.1 CWE-79 0.00209 0.58494
  • v2.7.0–v2.9.0
CVE-2015-3275 Medium 6.1 CWE-79 0.00209 0.58494
  • v2.7.0–v2.9.0
CVE-2015-5264 Medium 5.4 CWE-264 0.00153 0.52071
  • v2.7.0–v2.9.1
CVE-2015-5265 Medium 4.3 CWE-264 0.00152 0.5189
  • v2.7.0–v2.9.1
CVE-2015-5266 Medium 6.8 CWE-264 0.00152 0.5189
  • v2.7.0–v2.9.1
CVE-2016-2152 Medium 6.1 CWE-79 0.00209 0.58494
  • v3.0.0–v3.0.2
  • v2.7.0–v2.9.4
CVE-2016-2153 Medium 6.1 CWE-79 0.00209 0.58494
  • v3.0.0–v3.0.2
  • v2.7.0–v2.9.4
CVE-2016-2159 Medium 4.3 CWE-284 0.00153 0.52071
  • v3.0.0–v3.0.2
  • v2.7.0–v2.9.4
CVE-2016-3729 Medium 6.5 CWE-284 0.00116 0.46064
  • v3.0.0–v3.0.2
  • v2.7.0–v2.9.5
CVE-2016-3732 Medium 4.3 CWE-200 0.00094 0.41057
  • v3.0.0–v3.0.3
  • v2.7.0–v2.9.5
CVE-2016-3733 Medium 4.3 CWE-284 0.00141 0.50227
  • v3.0.0–v3.0.3
  • v2.7.0–v2.9.5
CVE-2016-5013 Medium 5.4 CWE-74 0.00082 0.36933
  • v3.0.0–v3.1.0
  • v2.7.0–v2.9.6
CVE-2016-7038 High 7.3 CWE-640 0.00093 0.4084
  • v3.0.0–v3.1.1
  • v2.7.0–v2.9.7
CVE-2016-8642 Medium 5.3 CWE-284 0.0006 0.27185
  • v3.0.0–v3.1.2
  • v2.7.0–v2.9.8
CVE-2017-2576 Medium 5.3 CWE-20 0.00067 0.31348
  • v3.0.0–v3.2.0
  • v2.7.0–v2.7.17
CVE-2017-2641 High 9.8 CWE-89 0.00245 0.63689
  • v3.0.0–v3.2.1
  • v2.7.0–v2.7.18
CVE-2017-7489 Medium 6.3 CWE-269 0.00108 0.44496
  • v3.0.0–v3.2.2
  • v2.7.0–v2.7.19
CVE-2017-7490 Medium 5.3 CWE-668 0.00107 0.44211
  • v3.0.0–v3.2.2
  • v2.7.0–v2.7.19
CVE-2017-7491 Medium 4.3 CWE-352 0.00068 0.31777
  • v3.0.0–v3.2.2
  • v2.7.0–v2.7.19
CVE-2015-0216 Low 3.5 CWE-79 0.00093 0.4067
  • v2.8.0–v2.8.1
CVE-2016-0725 Medium 6.1 CWE-79 0.00212 0.58782
  • v3.0.0–v3.0.1
  • v2.8.0–v2.9.3
CVE-2016-2154 Medium 4.3 CWE-200 0.00152 0.5189
  • v3.0.0–v3.0.2
  • v2.8.0–v2.9.4
CVE-2016-2155 Medium 4.3 CWE-264 0.00152 0.5189
  • v3.0.0–v3.0.2
  • v2.8.0–v2.9.4
CVE-2016-5014 Medium 5.4 CWE-200 0.00082 0.36933
  • v3.0.0–v3.1.0
  • v2.8.0–v2.9.6
CVE-2015-5331 Medium 4.3 CWE-254 0.00081 0.36693
  • v2.9.0–v2.9.2
CVE-2017-15110 Medium 4.3 CWE-200 0.00049 0.20145
  • v3.1.0–v3.3.2
CVE-2017-2578 Medium 6.1 CWE-79 0.00061 0.27887
  • v3.1.0–v3.2.0
CVE-2017-2642 Medium 6.5 CWE-200 0.00059 0.26547
  • v3.1.0–v3.3.0
CVE-2017-2644 Medium 6.1 CWE-79 0.00114 0.45572
  • v3.1.0–v3.2.1
CVE-2017-2645 Medium 6.1 CWE-79 0.00114 0.45572
  • v3.1.0–v3.2.1
CVE-2018-1042 Medium 6.5 CWE-918 0.00712 0.80269
  • v3.1.0–v3.4.0
CVE-2018-1044 Medium 4.3 CWE-200 0.00049 0.20145
  • v3.1.0–v3.4.0
CVE-2018-1045 Medium 5.4 CWE-79 0.00048 0.19919
  • v3.1.0–v3.3.3
CVE-2018-1081 Medium 5.3 CWE-79 0.00139 0.49997
  • v3.1.0–v3.4.1
CVE-2018-10891 High 7.3 CWE-20 0.00219 0.59536
  • v3.1.0–v3.5.0
CVE-2018-1135 Medium 6.5 CWE-200 0.00059 0.26547
  • v3.1.0–v3.4.2
CVE-2018-1136 Medium 4.3 CWE-79 0.00049 0.20145
  • v3.1.0–v3.4.2
CVE-2018-16854 Medium 6.5 CWE-352 0.00391 0.72979
  • v3.1.0–v3.5.2
CVE-2019-10134 Low 3.7 CWE-20 0.00081 0.36533
  • v3.1.0–v3.6.3
CVE-2019-3809 Medium 6.5 CWE-918, CWE-352 0.00193 0.56984
  • v3.1.0–v3.1.15
CVE-2019-3810 Medium 6.1 CWE-79 0.02289 0.89328
  • v3.1.0–v3.6.0
CVE-2019-3850 Medium 4.3 CWE-601 0.00075 0.3476
  • v3.1.0–v3.6.2
CVE-2016-5012 Medium 5.3 CWE-200 0.0006 0.27185
  • v3.1.0
CVE-2024-48900 Unknown CWE-200 0.00043 0.10859
  • v4.4.0–v4.4.3
CVE-2024-48899 Medium 4.3 CWE-284 0.00043 0.10859
  • v4.4.0–v4.4.2
CVE-2024-43430 Medium 5.3 CWE-276 0.00043 0.10859
  • v4.4.0–v4.4.1
CVE-2024-43433 Medium 5.3 CWE-863 0.00043 0.10859
  • v4.3.0–v4.4.1
CVE-2024-33999 High 9.8 CWE-20 0.00043 0.10859
  • v4.3.0–v4.3.3
CVE-2024-34007 Unknown CWE-352 0.00043 0.10859
  • v4.3.0–v4.3.3
CVE-2024-34009 High 7.5 CWE-20 0.00043 0.10859
  • v4.3.0–v4.3.3
CVE-2023-28335 High 8.8 CWE-352 0.00073 0.34072
  • v4.1.0–v4.1.1
CVE-2023-23922 Medium 6.1 CWE-79 0.00139 0.49933
  • v4.0.0–v4.1.0-beta
CVE-2022-45149 Medium 5.4 CWE-352 0.00209 0.58539
  • v4.0.0–v4.0.4
  • v3.9.0–v3.11.10
CVE-2022-45150 Medium 6.1 CWE-79 0.0017 0.54252
  • v4.0.0–v4.0.4
  • v3.9.0–v3.11.10
CVE-2022-45151 Medium 5.4 CWE-79 0.00091 0.40253
  • v4.0.0–v4.0.4
  • v3.11.0–v3.11.10
CVE-2022-45152 High 9.1 CWE-918 0.003 0.6915
  • v4.0.0–v4.0.4
  • v3.9.0–v3.11.10
CVE-2022-40313 High 7.1 CWE-79 0.00091 0.40196
  • v4.0.0–v4.0.3
  • v3.9.0–v3.11.9
CVE-2022-40315 High 9.8 CWE-89 0.0018 0.55412
  • v4.0.0–v4.0.3
  • v3.9.0–v3.11.9
CVE-2022-40316 Medium 4.3 CWE-668, CWE-862 0.0005 0.21439
  • v4.0.0–v4.0.3
  • v3.9.0–v3.11.9
CVE-2022-2986 High 8.8 CWE-352 0.00101 0.42548
  • v4.0.0–v4.0.2
  • v3.11.0–v3.11.8
CVE-2022-30596 Medium 5.4 CWE-79 0.00087 0.38749
  • v4.0.0
  • v3.9.0–v3.11.6
CVE-2022-30597 Medium 5.3 CWE-472 0.00132 0.48755
  • v4.0.0
  • v3.9.0–v3.11.6
CVE-2022-30598 Medium 4.3 CWE-200 0.0009 0.39698
  • v4.0.0
  • v3.9.0–v3.11.6
CVE-2022-30599 High 9.8 CWE-89 0.00375 0.72452
  • v4.0.0
  • v3.9.0–v3.11.6
CVE-2022-30600 High 9.8 CWE-682 0.00502 0.76201
  • v4.0.0
  • v3.9.0–v3.11.6
CVE-2022-35649 High 9.8 CWE-20, CWE-94 0.01758 0.8765
  • v4.0.0–v4.0.1
  • v3.9.0–v3.11.7
CVE-2022-35650 High 7.5 CWE-20, CWE-22 0.00188 0.56294
  • v4.0.0–v4.0.1
  • v3.9.0–v3.11.7
CVE-2022-35651 Medium 6.1 CWE-79 0.00326 0.70445
  • v4.0.0–v4.0.1
  • v3.9.0–v3.11.7
CVE-2022-35652 Medium 6.1 CWE-601 0.00691 0.79968
  • v4.0.0–v4.0.1
  • v3.9.0–v3.11.7
CVE-2022-35653 Medium 6.1 CWE-79 0.14751 0.95763
  • v4.0.0–v4.0.1
  • v3.9.0–v3.11.7
CVE-2021-20183 Medium 5.4 CWE-79 0.00078 0.35818
  • v3.10.0–v3.11.18
CVE-2020-25703 Medium 5.3 CWE-201, CWE-200 0.0011 0.44979
  • v3.7.0–v3.10.0-beta
CVE-2022-0985 Medium 4.3 CWE-287, CWE-863 0.0005 0.21439
  • v3.9.0–v3.11.5
CVE-2021-43558 Medium 6.1 CWE-79 0.00066 0.31108
  • v3.9.0–v3.11.3
CVE-2021-43559 High 8.8 CWE-352 0.00098 0.41833
  • v3.9.0–v3.11.3
CVE-2021-43560 Medium 5.3 CWE-668, CWE-863 0.00071 0.33011
  • v3.9.0–v3.11.3
CVE-2022-0333 Low 3.8 CWE-863 0.0005 0.21439
  • v3.9.0–v3.11.4
CVE-2022-0335 High 8.8 CWE-352 0.00098 0.41833
  • v3.9.0–v3.11.4
CVE-2021-40691 Medium 4.3 0.00062 0.28164
  • v3.9.0–v3.11.2
CVE-2021-40692 Medium 4.3 CWE-863 0.0005 0.21439
  • v3.9.0–v3.11.2
CVE-2021-40693 Medium 6.5 CWE-287 0.0005 0.21439
  • v3.9.0–v3.11.2
CVE-2021-40694 Medium 4.9 CWE-116 0.00063 0.2915
  • v3.9.0–v3.11.2
CVE-2021-40695 Medium 4.3 0.0005 0.21439
  • v3.9.0–v3.11.2
CVE-2021-32472 Medium 4.3 CWE-862 0.00066 0.30691
  • v3.8.0–v3.10.3
CVE-2021-32473 Medium 5.3 CWE-200 0.00084 0.37469
  • v3.5.0–v3.10.3
CVE-2021-32474 High 7.2 CWE-89 0.00087 0.38552
  • v3.5.0–v3.10.3
CVE-2021-32475 Medium 5.4 CWE-78, CWE-79 0.00055 0.25241
  • v3.5.0–v3.10.3
CVE-2021-32476 High 7.5 CWE-770 0.00103 0.43272
  • v3.5.17–v3.10.3
CVE-2021-32478 Medium 6.1 CWE-601, CWE-79 0.00078 0.35818
  • v3.8.0–v3.10.3
CVE-2021-20280 Medium 5.4 CWE-79 0.00161 0.53163
  • v3.5.0–v3.10.1
CVE-2021-20281 Medium 5.3 CWE-863, CWE-200 0.00095 0.41248
  • v3.5.0–v3.10.1
CVE-2021-20184 Medium 4.3 CWE-354 0.00054 0.25116
  • v3.8.0–v3.10.0
CVE-2021-20185 Medium 5.3 CWE-770, CWE-400 0.00092 0.40485
  • v3.5.1–v3.10.0
CVE-2021-20186 Medium 5.4 CWE-79 0.00054 0.25116
  • v3.5.0–v3.10.0
CVE-2021-20187 High 7.2 CWE-829, CWE-94 0.0009 0.39903
  • v3.5.0–v3.10.0
CVE-2020-25698 High 7.5 CWE-284 0.00144 0.50805
  • v3.5.0–v3.9.2
CVE-2020-25699 High 7.5 CWE-863, CWE-284, CWE-269 0.00186 0.56135
  • v3.5.0–v3.9.2
CVE-2020-25700 Medium 6.5 CWE-89 0.00236 0.61182
  • v3.5.0–v3.9.2
CVE-2020-25701 Medium 5.3 CWE-863, CWE-284 0.00182 0.55706
  • v3.5.0–v3.9.2
CVE-2020-25702 Medium 6.1 CWE-79 0.0012 0.46716
  • v3.9.0–v3.9.2
CVE-2020-25627 Medium 6.1 CWE-79 0.00078 0.35818
  • v3.9.0–v3.9.1
CVE-2020-25628 Medium 6.1 CWE-79 0.00084 0.3766
  • v3.5.0–v3.9.1
CVE-2020-25631 Medium 6.1 CWE-79 0.00078 0.35818
  • v3.7.0–v3.9.1
CVE-2020-14320 Medium 6.1 CWE-79 0.00072 0.33526
  • v3.7.0–v3.9.0
CVE-2020-10738 High 7.5 CWE-20 0.00451 0.7482
  • v3.5.0–v3.8.2
CVE-2020-1691 Medium 5.4 CWE-79 0.00054 0.25116
  • v3.8.0
CVE-2021-21809 High 9.1 CWE-78 0.14105 0.95663
  • v3.8.0–v3.11.2
CVE-2019-14879 Medium 5.4 CWE-264, CWE-273 0.00052 0.22697
  • v3.5.0–v3.7.2
CVE-2019-14880 High 9.1 CWE-287 0.00147 0.51079
  • v3.5.0–v3.7.2
CVE-2019-14881 Medium 6.1 CWE-79 0.00066 0.31108
  • v3.7.0–v3.7.2
CVE-2019-14882 Medium 6.1 CWE-601 0.00066 0.31108
  • v3.5.0–v3.7.2
CVE-2019-14883 Medium 5.3 CWE-285, CWE-862 0.00071 0.33011
  • v3.6.0–v3.7.2
CVE-2019-14884 Medium 6.1 CWE-79 0.00066 0.31108
  • v3.5.0–v3.7.2
CVE-2019-14828 Medium 4.3 CWE-285 0.00054 0.25116
  • v3.5.0–v3.7.1
CVE-2019-14829 Medium 4.3 CWE-573 0.00054 0.25116
  • v3.5.0–v3.7.1
CVE-2019-14830 Medium 6.1 CWE-601 0.00074 0.34394
  • v3.5.0–v3.7.1
CVE-2019-14831 Medium 6.1 CWE-601 0.00074 0.34394
  • v3.5.0–v3.7.1
CVE-2019-10186 High 8.8 CWE-352 0.00551 0.77352
  • v3.5.0–v3.7.0
CVE-2019-10187 Medium 4.3 CWE-284, CWE-862 0.00114 0.45552
  • v3.5.0–v3.7.0
CVE-2019-10154 High 7.5 CWE-285 0.00153 0.52074
  • v3.6.0–v3.6.3
CVE-2019-3848 Medium 4.3 CWE-863, CWE-285, CWE-200 0.00056 0.25391
  • v3.4.0–v3.6.2
CVE-2019-3851 Medium 4.3 CWE-264 0.0005 0.21439
  • v3.5.0–v3.6.2
CVE-2019-6970 High 7.5 CWE-918 0.00108 0.44486
  • v3.5.0–v3.5.3
CVE-2022-0332 High 9.8 CWE-89 0.00234 0.61041
  • v3.11.0–v3.11.4
CVE-2021-3943 High 9.8 CWE-20 0.00537 0.77052
  • v3.10.0–v3.11.3
CVE-2021-36398 Medium 5.4 CWE-79 0.00054 0.25116
  • v3.11.0
CVE-2021-32244 Medium 5.4 CWE-79 0.00068 0.31667
  • v3.10.3
CVE-2021-32477 Medium 4.3 CWE-200, CWE-862 0.00054 0.25116
  • v3.10.0–v3.10.3
CVE-2018-1043 Medium 6.5 CWE-254, CWE-289 0.00055 0.25158
  • v3.2.0–v3.4.0
CVE-2018-1082 High 8.1 CWE-287, CWE-285 0.0046 0.75073
  • v3.3.0–v3.4.1
CVE-2017-7298 Medium 5.4 CWE-79 0.00094 0.4102
  • v3.2.0–v3.2.2
CVE-2017-2643 Medium 5.3 CWE-200 0.00154 0.52117
  • v3.2.0–v3.2.1

moodle/moodle Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2024-48901 A vulnerability was found in Moodle. Additional checks are required to ensure users can only access the schedule of a report if they have permission to edit that report. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-48900 A vulnerability was found in Moodle. Additional checks are required to ensure users with permission to view badge recipients can only access lists of those they are intended to have access to. v4.4.3, v4.4.2, v4.4.1, v4.4.0 Patch → NO_SAFE_VERSION
CVE-2024-48899 A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to. v4.4.2, v4.4.1, v4.4.0, v4.4.0-rc2, v4.4.0-rc1, v4.4.0-beta Patch → NO_SAFE_VERSION
CVE-2024-48898 A vulnerability was found in Moodle. Users with access to delete audiences from reports could delete audiences from other reports that they do not have permission to delete from. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-48897 A vulnerability was found in Moodle. Additional checks are required to ensure users can only edit or delete RSS feeds that they have permission to modify. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-48896 A vulnerability was found in Moodle. It is possible for users with the "send message" capability to view other users' names that they may not otherwise have access to via an error message in Messaging. Note: The name returned follows the full name format configured on the site. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-45691 A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-45690 A flaw was found in Moodle. Additional checks were required to ensure users can only delete their OAuth2-linked accounts. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-45689 A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43440 A flaw was found in moodle. A local file may include risks when restoring block backups. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43438 A flaw was found in Feedback. Bulk messaging in the activity's non-respondents report did not verify message recipients belonging to the set of users returned by the report. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43437 A flaw was found in moodle. Insufficient sanitizing of data when performing a restore could result in a cross-site scripting (XSS) risk from malicious backup files. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43436 A SQL injection risk flaw was found in the XMLDB editor tool available to site administrators. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43435 A flaw was found in moodle. Insufficient capability checks make it possible for users with access to restore glossaries in courses to restore them into the global site glossary. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43434 The bulk message sending feature in Moodle's Feedback module's non-respondents report had an incorrect CSRF token check, leading to a CSRF vulnerability. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43433 A flaw was found in moodle. Matrix room membership and power levels are incorrectly applied and revoked for suspended Moodle users. v4.4.1, v4.4.0, v4.3.5, v4.3.4, v4.3.3, v4.3.2, v4.3.1, v4.3.0 Patch → NO_SAFE_VERSION
CVE-2024-43432 A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43431 A vulnerability was found in Moodle. Insufficient capability checks made it possible to delete badges that a user does not have permission to access. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43430 A flaw was found in moodle. External API access to Quiz can override contained insufficient access control. v4.4.1, v4.4.0 Patch → NO_SAFE_VERSION
CVE-2024-43429 A flaw was found in moodle. Some hidden user profile fields are visible in gradebook reports, which could result in users without the "view hidden user fields" capability having access to the information. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43428 To address a cache poisoning risk in Moodle, additional validation for local storage was required. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43427 A flaw was found in moodle. When creating an export of site administration presets, some sensitive secrets and keys are not being excluded from the export, which could result in them unintentionally being leaked if the presets are shared with a third party. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43426 A flaw was found in pdfTeX. Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available, such as those with TeX Live installed. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-43425 A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-38277 A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-38276 Incorrect CSRF token checks resulted in multiple CSRF risks. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-38275 The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-38274 Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-38273 Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34009 Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized. v4.3.3, v4.3.2, v4.3.1, v4.3.0 Patch → NO_SAFE_VERSION
CVE-2024-34008 Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34007 The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF. v4.3.3, v4.3.2, v4.3.1, v4.3.0 Patch → NO_SAFE_VERSION
CVE-2024-34006 The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34005 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34004 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34003 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34002 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34001 Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-34000 ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-33999 The referrer URL used by MFA required additional sanitizing, rather than being used directly. v4.3.3, v4.3.2, v4.3.1, v4.3.0 Patch → NO_SAFE_VERSION
CVE-2024-33998 Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-33997 Additional sanitizing was required when opening the equation editor to prevent a stored XSS risk when editing another user's equation. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-33996 Incorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-29374 A Cross-Site Scripting (XSS) vulnerability exists in the way MOODLE 3.10.9 handles user input within the "GET /?lang=" URL parameter. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-28593 The Chat activity in Moodle 4.3.3 allows students to insert a potentially unwanted HTML A element or IMG element, or HTML content that leads to a performance degradation. NOTE: the vendor's Using_Chat page says "If you know some HTML code, you can use it in your text to do things like insert images, play sounds or create different coloured and sized text." This page also says "Chat is due to be removed from standard Moodle." dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-25983 Insufficient checks in a web service made it possible to add comments to the comments block on another user's dashboard when it was not otherwise available (e.g., on their profile page). dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-25982 The link to update all installed language packs did not include the necessary token to prevent a CSRF risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-25981 Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups. By default this only provided additional access to non-editing teachers. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-25980 Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups. By default this only provided additional access to non-editing teachers. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-25979 The URL parameters accepted by forum search were not limited to the allowed parameters. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-25978 Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2024-1439 Inadequate access control in Moodle LMS. This vulnerability could allow a local user with a student role to create arbitrary events intended for users with higher roles. It could also allow the attacker to add events to the calendar of all users without their prior consent. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5551 Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5550 In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5549 Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5548 Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5547 The course upload preview contained an XSS risk for users uploading unsafe data. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5546 ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5545 H5P metadata automatically populated the author with the user's username, which could be sensitive information. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5544 Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5542 Students in "Only see own membership" groups could see other students in the group, which should be hidden. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5541 The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5540 A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-5539 A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-35133 An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-35132 A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-35131 Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-30944 The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-30943 The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-28336 Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-28335 The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk. v4.1.1, v4.1.0 Patch → NO_SAFE_VERSION
CVE-2023-28334 Authenticated users were able to enumerate other users' names via the learning plans page. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-28333 The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS). dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-28332 If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-28331 Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-28330 Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-28329 Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers). dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-23923 The vulnerability was found Moodle which exists due to insufficient limitations on the "start page" preference. A remote attacker can set that preference for another user. The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-23922 The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in blog search. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks. v4.1.0, v4.1.0-rc3, v4.1.0-rc2, v4.1.0-rc1, v4.1.0-beta, v4.0.5, v4.0.4, v4.0.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2023-23921 The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2023-1402 The course participation report required additional checks to prevent roles being displayed which the user did not have access to view. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2022-45152 A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks. v4.0.4, v4.0.3, v4.0.2, v4.0.0, v4.0.1, v3.9.17, v3.9.16, v3.9.15 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-45151 The stored-XSS vulnerability was discovered in Moodle which exists due to insufficient sanitization of user-supplied data in several "social" user profile fields. An attacker could inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website. v4.0.4, v4.0.3, v4.0.2, v4.0.0, v4.0.1, v3.11.10, v3.11.9, v3.11.8 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-45150 A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages. v4.0.4, v4.0.3, v4.0.2, v4.0.0, v4.0.1, v3.9.17, v3.9.16, v3.9.15 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-45149 A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks. v4.0.4, v4.0.3, v4.0.2, v4.0.0, v4.0.1, v3.9.17, v3.9.16, v3.9.15 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-40316 The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to. v4.0.3, v4.0.2, v4.0.0, v4.0.1, v3.9.16, v3.9.15, v3.9.14, v3.9.13 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-40315 A limited SQL injection risk was identified in the "browse list of users" site administration page. v4.0.3, v4.0.2, v4.0.0, v4.0.1, v3.9.16, v3.9.15, v3.9.14, v3.9.13 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-40314 A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2022-40313 Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load. v4.0.3, v4.0.2, v4.0.0, v4.0.1, v3.9.16, v3.9.15, v3.9.14, v3.9.13 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-40208 In Moodle, insufficient limitations in some quiz web services made it possible for students to bypass sequential navigation during a quiz attempt. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2022-35653 A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users. v4.0.0, v4.0.1, v3.9.14, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-35652 An open redirect issue was found in Moodle due to improper sanitization of user-supplied data in mobile auto-login feature. A remote attacker can create a link that leads to a trusted website, however, when clicked, it redirects the victims to arbitrary URL/domain. Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information. v4.0.0, v4.0.1, v3.9.14, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-35651 A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. v4.0.0, v4.0.1, v3.9.14, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-35650 The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default. v4.0.0, v4.0.1, v3.9.14, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-35649 The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. v4.0.0, v4.0.1, v3.9.14, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-30600 A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed. v4.0.0, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9, v3.9.8, v3.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-30599 A flaw was found in moodle where an SQL injection risk was identified in Badges code relating to configuring criteria. v4.0.0, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9, v3.9.8, v3.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-30598 A flaw was found in moodle where global search results could include author information on some activities where a user may not otherwise have access to it. v4.0.0, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9, v3.9.8, v3.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-30597 A flaw was found in moodle where the description user field was not hidden when being set as a hidden user field. v4.0.0, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9, v3.9.8, v3.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-30596 A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk. v4.0.0, v3.9.13, v3.9.12, v3.9.11, v3.9.10, v3.9.9, v3.9.8, v3.9.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-2986 Enabling and disabling installed H5P libraries did not include the necessary token to prevent a CSRF risk. v4.0.2, v4.0.0, v4.0.1, v3.11.8, v3.11.7, v3.11.6, v3.11.5, v3.11.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-0985 Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability. v3.9.12, v3.9.11, v3.9.10, v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-0984 Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2022-0983 An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2022-0335 A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk. v3.9.10, v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-0334 A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2022-0333 A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events. v3.9.10, v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2022-0332 A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data. v3.11.4, v3.11.3, v3.11.1, v3.11.2, v3.11.0 Patch → NO_SAFE_VERSION
CVE-2021-43560 A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. Insufficient capability checks made it possible to fetch other users' calendar action events. v3.9.10, v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-43559 A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. The "delete related badge" functionality did not include the necessary token check to prevent a CSRF risk. v3.9.10, v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-43558 A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A URL parameter in the filetype site administrator tool required extra sanitizing to prevent a reflected XSS risk. v3.9.10, v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-40695 It was possible for a student to view their quiz grade before it had been released, using a quiz web service. v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-40694 Insufficient escaping of the LaTeX preamble made it possible for site administrators to read files available to the HTTP server system account. v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-40693 An authentication bypass risk was identified in the external database authentication functionality, due to a type juggling vulnerability. v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-40692 Insufficient capability checks made it possible for teachers to download users outside of their courses. v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-40691 A session hijack risk was identified in the Shibboleth authentication plugin. v3.9.9, v3.9.8, v3.9.7, v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-3943 A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A remote code execution risk when restoring backup files was identified. v3.11.3, v3.11.1, v3.11.2, v3.11.0, v3.10.7, v3.10.6, v3.10.5, v3.10.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36568 In certain Moodle products after creating a course, it is possible to add in a arbitrary "Topic" a resource, in this case a "Database" with the type "Text" where its values "Field name" and "Field description" are vulnerable to Cross Site Scripting Stored(XSS). This affects Moodle 3.11 and Moodle 3.10.4 and Moodle 3.9.7. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36403 In Moodle, in some circumstances, email notifications of messages could have the link back to the original message hidden by HTML, which may pose a phishing risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36402 In Moodle, Users' names required additional sanitizing in the account confirmation email, to prevent a self-registration phishing risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36401 In Moodle, ID numbers exported in HTML data formats required additional sanitizing to prevent a local stored XSS risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36400 In Moodle, insufficient capability checks made it possible to remove other users' calendar URL subscriptions. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36399 In Moodle, ID numbers displayed in the quiz override screens required additional sanitizing to prevent a stored XSS risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36398 In moodle, ID numbers displayed in the web service token list required additional sanitizing to prevent a stored XSS risk. v3.11.0 Patch → NO_SAFE_VERSION
CVE-2021-36397 In Moodle, insufficient capability checks meant message deletions were not limited to the current user. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36396 In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36395 In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36394 In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36393 In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-36392 In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-32478 The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected. v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.8 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-32477 The last time a user accessed the mobile app is displayed on their profile page, but should be restricted to users with the relevant capability (site administrators by default). Moodle versions 3.10 to 3.10.3 are affected. v3.10.3, v3.10.2, v3.10.1, v3.10.0 Patch → NO_SAFE_VERSION
CVE-2021-32476 A denial-of-service risk was identified in the draft files area, due to it not respecting user file upload limits. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.8 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-32475 ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.8 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-32474 An SQL injection risk existed on sites with MNet enabled and configured, via an XML-RPC call from the connected peer host. Note that this required site administrator access or access to the keypair. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.8 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-32473 It was possible for a student to view their quiz grade before it had been released, using a quiz web service. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.8 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-32472 Teachers exporting a forum in CSV format could receive a CSV of forums from all courses in some circumstances. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6 and 3.8 to 3.8.8 are affected. v3.9.6, v3.9.5, v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.8 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-32244 Cross Site Scripting (XSS) in Moodle 3.10.3 allows remote attackers to execute arbitrary web script or HTML via the "Description" field. v3.10.3 Patch → NO_SAFE_VERSION
CVE-2021-27131 Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the "Additional HTML Section" via "Header and Footer" parameter in /admin/settings.php. This vulnerability is leading an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer. NOTE: this is disputed by the vendor because the "Additional HTML Section" for "Header and Footer" can only be supplied by an administrator, who is intentionally allowed to enter unsanitized input (e.g., site-specific JavaScript). dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-21809 A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities. v3.8.0, v3.11.2, v3.10.0 Patch → NO_SAFE_VERSION
CVE-2021-20283 The web service responsible for fetching other users' enrolled courses did not validate that the requesting user had permission to view that information in each course in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20282 When creating a user account, it was possible to verify the account without having access to the verification email link/secret in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20281 It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.7, v3.8.6, v3.8.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20280 Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. v3.9.4, v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.7, v3.8.6, v3.8.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20279 The ID number user profile field required additional sanitizing to prevent a stored XSS risk in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20187 It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that it was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication. v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.6, v3.8.5, v3.8.4, v3.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20186 It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that if the TeX notation filter was enabled, additional sanitizing of TeX content was required to prevent the risk of stored XSS. v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.6, v3.8.5, v3.8.4, v3.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20185 It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that messaging did not impose a character limit when sending messages, which could result in client-side (browser) denial of service for users receiving very large messages. v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.6, v3.8.5, v3.8.4, v3.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20184 It was found in Moodle before version 3.10.1, 3.9.4 and 3.8.7 that a insufficient capability checks in some grade related web services meant students were able to view other students grades. v3.9.3, v3.9.2, v3.9.1, v3.9.0, v3.8.6, v3.8.5, v3.8.4, v3.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-20183 It was found in Moodle before version 3.10.1 that some search inputs were vulnerable to reflected XSS due to insufficient escaping of search queries. v3.11.18, v3.11.17, v3.11.16, v3.11.15, v3.11.14, v3.11.13, v3.11.12, v3.11.11 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25703 The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10. v3.10.0-rc2, v3.10.0-rc1, v3.10.0-beta, v3.9.2, v3.9.1, v3.9.0, v3.8.5, v3.8.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25702 In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10. v3.9.2, v3.9.1, v3.9.0 Patch → NO_SAFE_VERSION
CVE-2020-25701 If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10. v3.9.2, v3.9.1, v3.9.0, v3.8.5, v3.8.4, v3.8.3, v3.8.2, v3.8.1 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25700 In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10. v3.9.2, v3.9.1, v3.9.0, v3.8.5, v3.8.4, v3.8.3, v3.8.2, v3.8.1 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25699 In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10. v3.9.2, v3.9.1, v3.9.0, v3.8.5, v3.8.4, v3.8.3, v3.8.2, v3.8.1 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25698 Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10. v3.9.2, v3.9.1, v3.9.0, v3.8.5, v3.8.4, v3.8.3, v3.8.2, v3.8.1 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25631 A vulnerability was found in Moodle 3.9 to 3.9.1, 3.8 to 3.8.4 and 3.7 to 3.7.7 where it was possible to include JavaScript in a book's chapter title, which was not escaped on the "Add new chapter" page. This is fixed in 3.9.2, 3.8.5 and 3.7.8. v3.9.1, v3.9.0, v3.8.4, v3.8.3, v3.8.2, v3.8.1, v3.8.0, v3.7.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25630 A vulnerability was found in Moodle where the decompressed size of zip files was not checked against available user quota before unzipping them, which could lead to a denial of service risk. This affects versions 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25629 A vulnerability was found in Moodle where users with "Log in as" capability in a course context (typically, course managers) may gain access to some site administration capabilities by "logging in as" a System manager. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. This is fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25628 The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14. v3.9.1, v3.9.0, v3.8.4, v3.8.3, v3.8.2, v3.8.1, v3.8.0, v3.7.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-25627 The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2. v3.9.1, v3.9.0 Patch → NO_SAFE_VERSION
CVE-2020-1692 Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2020-1691 In Moodle 3.8, messages required extra sanitizing before updating the conversation overview, to prevent the risk of stored cross-site scripting. v3.8.0 Patch → NO_SAFE_VERSION
CVE-2020-14320 In Moodle before 3.9.1, 3.8.4 and 3.7.7, the filter in the admin task log required extra sanitizing to prevent a reflected XSS risk. v3.9.0, v3.8.3, v3.8.2, v3.8.1, v3.8.0, v3.7.6, v3.7.5, v3.7.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-10738 A flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution. v3.8.2, v3.8.1, v3.8.0, v3.7.5, v3.7.4, v3.7.3, v3.7.2, v3.7.1 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-6970 Moodle 3.5.x before 3.5.4 allows SSRF. v3.5.3, v3.5.2, v3.5.1, v3.5.0 Patch → NO_SAFE_VERSION
CVE-2019-3852 A vulnerability was found in moodle before version 3.6.3. The get_with_capability_join and get_users_by_capability functions were not taking context freezing into account when checking user capabilities dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-3851 A vulnerability was found in moodle before versions 3.6.3 and 3.5.5. There was a link to site home within the the Boost theme's secure layout, meaning students could navigate out of the page. v3.6.2, v3.6.1, v3.6.0, v3.5.4, v3.5.3, v3.5.2, v3.5.1, v3.5.0 Patch → NO_SAFE_VERSION
CVE-2019-3850 A vulnerability was found in moodle before versions 3.6.3, 3.5.5, 3.4.8 and 3.1.17. Links within assignment submission comments would open directly (in the same window). Although links themselves may be valid, opening within the same window and without the no-referrer header policy made them more susceptible to exploits. v3.1.2, v3.1.0, v3.1.1, v3.6.2, v3.6.1, v3.6.0, v3.5.4, v3.5.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-3849 A vulnerability was found in moodle before versions 3.6.3, 3.5.5 and 3.4.8. Users could assign themselves an escalated role within courses or content accessed via LTI, by modifying the request to the LTI publisher site. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-3848 A vulnerability was found in moodle before versions 3.6.3, 3.5.5 and 3.4.8. Permissions were not correctly checked before loading event information into the calendar's edit event modal popup, so logged in non-guest users could view unauthorised calendar events. (Note: It was read-only access, users could not edit the events.) v3.6.2, v3.6.1, v3.6.0, v3.5.4, v3.5.3, v3.5.2, v3.5.1, v3.5.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-3847 A vulnerability was found in moodle before versions 3.6.3, 3.5.5, 3.4.8 and 3.1.17. Users with the "login as other users" capability (such as administrators/managers) can access other users' Dashboards, but the JavaScript those other users may have added to their Dashboard was not being escaped when being viewed by the user logging in on their behalf. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-3810 A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users' full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted. v3.1.2, v3.1.0, v3.1.1, v3.6.0, v3.5.2, v3.5.1, v3.5.0, v3.4.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-3809 A flaw was found in Moodle versions 3.1 to 3.1.15 and earlier unsupported versions. The mybackpack functionality allowed setting the URL of badges, when it should be restricted to the Mozilla Open Badges backpack URL. This resulted in the possibility of blind SSRF via requests made by the page. v3.1.2, v3.1.0, v3.1.1, v3.1.15, v3.1.14, v3.1.13, v3.1.12, v3.1.11 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-3808 A flaw was found in Moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The 'manage groups' capability did not have the 'XSS risk' flag assigned to it, but does have that access in certain places. Note that the capability is intended for use by trusted users, and is only assigned to teachers and managers by default. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-18210 Persistent XSS in /course/modedit.php of Moodle through 3.7.2 allows authenticated users (Teacher and above) to inject JavaScript into the session of another user (e.g., enrolled student or site administrator) via the introeditor[text] parameter. NOTE: the discoverer and vendor disagree on whether Moodle customers have a reasonable expectation that anyone authenticated as a Teacher can be trusted with the ability to add arbitrary JavaScript (this ability is not documented on Moodle's Teacher_role page). Because the vendor has this expectation, they have stated "this report has been closed as a false positive, and not a bug." dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14884 A vulnerability was found in Moodle 3.7 before 3.73, 3.6 before 3.6.7 and 3.5 before 3.5.9, where a reflected XSS possible from some fatal error messages. v3.7.2, v3.7.1, v3.7.0, v3.6.6, v3.6.5, v3.6.4, v3.6.3, v3.6.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14883 A vulnerability was found in Moodle 3.6 before 3.6.7 and 3.7 before 3.7.3, where tokens used to fetch inline atachments in email notifications were not disabled when a user's account was no longer active. Note: to access files, a user would need to know the file path, and their token. v3.7.2, v3.7.1, v3.7.0, v3.6.6, v3.6.5, v3.6.4, v3.6.3, v3.6.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14882 A vulnerability was found in Moodle 3.7 to 3.7.3, 3.6 to 3.6.7, 3.5 to 3.5.9 and earlier where an open redirect existed in the Lesson edit page. v3.7.2, v3.7.1, v3.7.0, v3.6.6, v3.6.5, v3.6.4, v3.6.3, v3.6.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14881 A vulnerability was found in moodle 3.7 before 3.7.3, where there is blind XSS reflected in some locations where user email is displayed. v3.7.2, v3.7.1, v3.7.0 Patch → NO_SAFE_VERSION
CVE-2019-14880 A vulnerability was found in Moodle versions 3.7 before 3.7.3, 3.6 before 3.6.7, 3.5 before 3.5.9 and earlier. OAuth 2 providers who do not verify users' email address changes require additional verification during sign-up to reduce the risk of account compromise. v3.7.2, v3.7.1, v3.7.0, v3.6.6, v3.6.5, v3.6.4, v3.6.3, v3.6.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14879 A vulnerability was found in Moodle versions 3.7.x before 3.7.3, 3.6.x before 3.6.7 and 3.5.x before 3.5.9. When a cohort role assignment was removed, the associated capabilities were not being revoked (where applicable). v3.7.2, v3.7.1, v3.7.0, v3.6.6, v3.6.5, v3.6.4, v3.6.3, v3.6.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14831 A vulnerability was found in Moodle 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where forum subscribe link contained an open redirect if forced subscription mode was enabled. If a forum's subscription mode was set to "forced subscription", the forum's subscribe link contained an open redirect. v3.7.1, v3.7.0, v3.6.5, v3.6.4, v3.6.3, v3.6.2, v3.6.1, v3.6.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14830 A vulnerability was found in Moodle 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where the mobile launch endpoint contained an open redirect in some circumstances, which could result in a user's mobile access token being exposed. (Note: This does not affect sites with a forced URL scheme configured, mobile service disabled, or where the mobile app login method is "via the app"). v3.7.1, v3.7.0, v3.6.5, v3.6.4, v3.6.3, v3.6.2, v3.6.1, v3.6.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14829 A vulnerability was found in Moodle affection 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions where activity creation capabilities were not correctly respected when selecting the activity to use for a course in single activity mode. v3.7.1, v3.7.0, v3.6.5, v3.6.4, v3.6.3, v3.6.2, v3.6.1, v3.6.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14828 A vulnerability was found in Moodle affecting 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where users with the capability to create courses were assigned as a teacher in those courses, regardless of whether they had the capability to be automatically assigned that role. v3.7.1, v3.7.0, v3.6.5, v3.6.4, v3.6.3, v3.6.2, v3.6.1, v3.6.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-14827 A vulnerability was found in Moodle where javaScript injection was possible in some Mustache templates via recursive rendering from contexts. Mustache helper tags that were included in template contexts were not being escaped before that context was injected into another Mustache helper, which could result in script injection in some templates. This affects versions 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-10189 A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. Teachers in an assignment group could modify group overrides for other groups in the same assignment. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-10188 A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. Teachers in a quiz group could modify group overrides for other groups in the same quiz. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2019-10187 A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. Users with permission to delete entries from a glossary were able to delete entries from other glossaries they did not have direct access to. v3.7.0, v3.6.4, v3.6.3, v3.6.2, v3.6.1, v3.6.0, v3.5.5, v3.5.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-10186 A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. A sesskey (CSRF) token was not being utilised by the XML loading/unloading admin tool. v3.7.0, v3.6.4, v3.6.3, v3.6.2, v3.6.1, v3.6.0, v3.5.5, v3.5.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-10154 A flaw was found in Moodle before versions 3.7, 3.6.4. A web service fetching messages was not restricted to the current user's conversations. v3.6.3, v3.6.2, v3.6.1, v3.6.0 Patch → NO_SAFE_VERSION
CVE-2019-10134 A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The size of users' private file uploads via email were not correctly checked, so their quota allowance could be exceeded. v3.1.2, v3.1.0, v3.1.1, v3.6.3, v3.6.2, v3.6.1, v3.6.0, v3.5.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-10133 A flaw was found in Moodle before 3.7, 3.6.4, 3.5.6, 3.4.9 and 3.1.18. The form to upload cohorts contained a redirect field, which was not restricted to internal URLs. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-16854 A flaw was found in moodle versions 3.5 to 3.5.2, 3.4 to 3.4.5, 3.3 to 3.3.8, 3.1 to 3.1.14 and earlier. The login form is not protected by a token to prevent login cross-site request forgery. Fixed versions include 3.6, 3.5.3, 3.4.6, 3.3.9 and 3.1.15. v3.1.2, v3.1.0, v3.1.1, v3.5.2, v3.5.1, v3.5.0, v3.4.5, v3.4.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-14631 moodle before versions 3.5.2, 3.4.5, 3.3.8 is vulnerable to a boost theme - blog search GET parameter insufficiently filtered. The breadcrumb navigation provided by Boost theme when displaying search results of a blog were insufficiently filtered, which could result in reflected XSS if a user followed a malicious link containing JavaScript in the search parameter. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-14630 moodle before versions 3.5.2, 3.4.5, 3.3.8, 3.1.14 is vulnerable to an XML import of ddwtos could lead to intentional remote code execution. When importing legacy 'drag and drop into text' (ddwtos) type quiz questions, it was possible to inject and execute PHP code from within the imported questions, either intentionally or by importing questions from an untrusted source. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1137 An issue was discovered in Moodle 3.x. By substituting URLs in portfolios, users can instantiate any class. This can also be exploited by users who are logged in as guests to create a DDoS attack. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1136 An issue was discovered in Moodle 3.x. An authenticated user is allowed to add HTML blocks containing scripts to their Dashboard; this is normally not a security issue because a personal dashboard is visible to this user only. Through this security vulnerability, users can move such a block to other pages where they can be viewed by other users. v3.1.2, v3.1.0, v3.1.1, v3.1.11, v3.1.10, v3.1.9, v3.1.8, v3.1.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1135 An issue was discovered in Moodle 3.x. Students who posted on forums and exported the posts to portfolios can download any stored Moodle file by changing the download URL. v3.1.2, v3.1.0, v3.1.1, v3.1.11, v3.1.10, v3.1.9, v3.1.8, v3.1.7 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1134 An issue was discovered in Moodle 3.x. Students who submitted assignments and exported them to portfolios can download any stored Moodle file by changing the download URL. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1133 An issue was discovered in Moodle 3.x. A Teacher creating a Calculated question can intentionally cause remote code execution on the server, aka eval injection. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-10891 A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7, 3.1.13. When a quiz question bank is imported, it was possible for the question preview that is displayed to execute JavaScript that is written into the question bank. v3.1.2, v3.1.0, v3.1.1, v3.5.0, v3.4.3, v3.3.6, v3.2.9, v3.1.12 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-10890 A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7, 3.1.13. It was possible for the core_course_get_categories web service to return hidden categories, which should be omitted when fetching course categories. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-10889 A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7. No option existed to omit logs from data privacy exports, which may contain details of other users who interacted with the requester. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1082 A flaw was found in Moodle 3.4 to 3.4.1, and 3.3 to 3.3.4. If a user account using OAuth2 authentication method was once confirmed but later suspended, the user could still login to the site. v3.4.0, v3.4.1, v3.3.4, v3.3.3, v3.3.2, v3.3.0, v3.3.1 Patch → NO_SAFE_VERSION
CVE-2018-1081 A flaw was found in Moodle 3.4 to 3.4.1, 3.3 to 3.3.4, 3.2 to 3.2.7, 3.1 to 3.1.10 and earlier unsupported versions. Unauthenticated users can trigger custom messages to admin via paypal enrol script. Paypal IPN callback script should only send error emails to admin after request origin was verified, otherwise admin email can be spammed. v3.1.2, v3.1.0, v3.1.1, v3.1.10, v3.1.9, v3.1.8, v3.1.7, v3.1.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1045 In Moodle 3.x, there is XSS via a calendar event name. v3.1.2, v3.1.0, v3.1.1, v3.1.9, v3.1.8, v3.1.7, v3.1.6, v3.1.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1044 In Moodle 3.x, quiz web services allow students to see quiz results when it is prohibited in the settings. v3.1.2, v3.1.0, v3.1.1, v3.1.9, v3.1.8, v3.1.7, v3.1.6, v3.1.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1043 In Moodle 3.x, the setting for blocked hosts list can be bypassed with multiple A record hostnames. v3.4.0, v3.3.3, v3.3.2, v3.3.0, v3.3.1, v3.2.6, v3.2.5, v3.2.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2018-1042 Moodle 3.x has Server Side Request Forgery in the filepicker. v3.1.2, v3.1.0, v3.1.1, v3.1.9, v3.1.8, v3.1.7, v3.1.6, v3.1.5 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-7532 In Moodle 3.x, course creators are able to change system default settings for courses. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2017-7531 In Moodle 3.3, the course overview block reveals activities in hidden courses. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2017-7491 In Moodle 2.x and 3.x, a CSRF attack is possible that allows attackers to change the "number of courses displayed in the course overview block" configuration setting. v2.7.0, v2.7.2, v2.7.1, v2.7.3, v2.7.4, v2.7.5, v2.7.7, v2.7.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-7490 In Moodle 2.x and 3.x, searching of arbitrary blogs is possible because a capability check is missing. v2.7.0, v2.7.2, v2.7.1, v2.7.3, v2.7.4, v2.7.5, v2.7.7, v2.7.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-7489 In Moodle 2.x and 3.x, remote authenticated users can take ownership of arbitrary blogs by editing an external blog link. v2.7.0, v2.7.2, v2.7.1, v2.7.3, v2.7.4, v2.7.5, v2.7.7, v2.7.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-7298 In Moodle 3.2.2+, there is XSS in the Course summary filter of the "Add a new course" page, as demonstrated by a crafted attribute of an SVG element. v3.2.2, v3.2.1, v3.2.0 Patch → NO_SAFE_VERSION
CVE-2017-2645 In Moodle 3.x, XSS can occur via attachments to evidence of prior learning. v3.1.2, v3.1.0, v3.1.1, v3.1.4, v3.1.3, v3.2.1, v3.2.0 Patch → NO_SAFE_VERSION
CVE-2017-2644 In Moodle 3.x, XSS can occur via evidence of prior learning. v3.1.2, v3.1.0, v3.1.1, v3.1.4, v3.1.3, v3.2.1, v3.2.0 Patch → NO_SAFE_VERSION
CVE-2017-2643 In Moodle 3.2.x, global search displays user names for unauthenticated users. v3.2.1, v3.2.0 Patch → NO_SAFE_VERSION
CVE-2017-2642 Moodle 3.x has user fullname disclosure on the user preferences page. v3.1.2, v3.1.0, v3.1.1, v3.1.6, v3.1.5, v3.1.4, v3.1.3, v3.3.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-2641 In Moodle 2.x and 3.x, SQL injection can occur via user preferences. v2.7.0, v2.7.2, v2.7.1, v2.7.3, v2.7.4, v2.7.5, v2.7.7, v2.7.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-2578 In Moodle 3.x, there is XSS in the assignment submission page. v3.1.2, v3.1.0, v3.1.1, v3.1.3, v3.2.0 Patch → NO_SAFE_VERSION
CVE-2017-2576 In Moodle 2.x and 3.x, there is incorrect sanitization of attributes in forums. v2.7.0, v2.7.2, v2.7.1, v2.7.3, v2.7.4, v2.7.5, v2.7.7, v2.7.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-15110 In Moodle 3.x, students can find out email addresses of other students in the same course. Using search on the Participants page, students could search email addresses of all participants regardless of email visibility. This allows enumerating and guessing emails of other students. v3.1.2, v3.1.0, v3.1.1, v3.1.8, v3.1.7, v3.1.6, v3.1.5, v3.1.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-12157 In Moodle 3.x, various course reports allow teachers to view details about users in the groups they can't access. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2017-12156 Moodle 3.x has XSS in the contact form on the "non-respondents" page in non-anonymous feedback. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-9188 Cross-site scripting (XSS) vulnerabilities in Moodle CMS on or before 3.1.2 allow remote attackers to inject arbitrary web script or HTML via the s_additionalhtmlhead, s_additionalhtmltopofbody, and s_additionalhtmlfooter parameters. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-9187 Unrestricted file upload vulnerability in the double extension support in the "image" module in Moodle 3.1.2 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, and then accessing it via unspecified vectors. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-8642 In Moodle 2.x and 3.x, the question engine allows access to files that should not be available. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-7038 In Moodle 2.x and 3.x, web service tokens are not invalidated when the user password is changed or forced to be changed. v2.7.0, v2.7.2, v2.7.1, v2.7.3, v2.7.4, v2.7.5, v2.7.7, v2.7.6 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-5014 In Moodle 2.x and 3.x, an unenrolled user still receives event monitor notifications even though they can no longer access the course. v2.8.1, v2.8.0, v2.8.2, v2.8.3, v2.8.5, v2.8.4, v2.9.1, v2.9.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-5013 In Moodle 2.x and 3.x, text injection can occur in email headers, potentially leading to outbound spam. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-5012 In Moodle 3.x, glossary search displays entries without checking user permissions to view them. v3.1.0 Patch → NO_SAFE_VERSION
CVE-2016-3734 Cross-site request forgery (CSRF) vulnerability in markposts.php in Moodle 3.0 through 3.0.3, 2.9 through 2.9.5, 2.8 through 2.8.11, 2.7 through 2.7.13 and earlier allows remote attackers to hijack the authentication of users for requests that marks forum posts as read. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-3733 The "restore teacher" feature in Moodle 3.0 through 3.0.3, 2.9 through 2.9.5, 2.8 through 2.8.11, 2.7 through 2.7.13, and earlier allows remote authenticated users to overwrite the course idnumber. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-3732 The capability check to access other badges in Moodle 3.0 through 3.0.3, 2.9 through 2.9.5, 2.8 through 2.8.11, 2.7 through 2.7.13, and earlier allows remote authenticated users to read the badges of other users. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-3729 The user editing form in Moodle 3.0 through 3.0.3, 2.9 through 2.9.5, 2.8 through 2.8.11, 2.7 through 2.7.13, and earlier allows remote authenticated users to edit profile fields locked by the administrator. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2190 Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 does not properly restrict links, which allows remote attackers to obtain sensitive URL information by reading a Referer log. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2159 The save_submission function in mod/assign/externallib.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 allows remote authenticated users to bypass intended due-date restrictions by leveraging the student role for a web-service request. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2158 lib/ajax/getnavbranch.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3, when the forcelogin feature is enabled, allows remote attackers to obtain sensitive category-detail information from the navigation branch by leveraging the guest role for an Ajax request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2157 Cross-site request forgery (CSRF) vulnerability in mod/assign/adminmanageplugins.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 allows remote attackers to hijack the authentication of administrators for requests that manage Assignment plugins. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2156 calendar/externallib.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 provides calendar-event data without considering whether an activity is hidden, which allows remote authenticated users to obtain sensitive information via a web-service request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2155 The grade-reporting feature in Singleview (aka Single View) in Moodle 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 does not consider the moodle/grade:manage capability, which allows remote authenticated users to modify "Exclude grade" settings by leveraging the Non-Editing Instructor role. v2.8.1, v2.8.0, v2.8.2, v2.8.3, v2.8.5, v2.8.4, v2.9.1, v2.9.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2154 admin/tool/monitor/lib.php in Event Monitor in Moodle 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 does not consider the moodle/course:viewhiddencourses capability, which allows remote authenticated users to discover hidden course names by subscribing to a rule. v2.8.1, v2.8.0, v2.8.2, v2.8.3, v2.8.5, v2.8.4, v2.9.1, v2.9.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2153 Cross-site scripting (XSS) vulnerability in the advanced-search feature in mod_data in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 allows remote attackers to inject arbitrary web script or HTML via a crafted field in a URL, as demonstrated by a search form field. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2152 Multiple cross-site scripting (XSS) vulnerabilities in auth/db/auth.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 allow remote attackers to inject arbitrary web script or HTML via an external DB profile field. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-2151 user/index.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 grants excessive authorization on the basis of the moodle/course:viewhiddenuserfields capability, which allows remote authenticated users to discover student e-mail addresses by leveraging the teacher role and reading a Participants list. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2016-0725 Cross-site scripting (XSS) vulnerability in the search_pagination function in course/classes/management_renderer.php in Moodle 2.8.x before 2.8.10, 2.9.x before 2.9.4, and 3.0.x before 3.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted search string. v2.8.1, v2.8.0, v2.8.2, v2.8.3, v2.8.5, v2.8.4, v2.9.1, v2.9.0 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-0724 The (1) core_enrol_get_course_enrolment_methods and (2) enrol_self_get_instance_info web services in Moodle through 2.6.11, 2.7.x before 2.7.12, 2.8.x before 2.8.10, 2.9.x before 2.9.4, and 3.0.x before 3.0.2 do not consider the moodle/course:viewhiddencourses capability, which allows remote authenticated users to obtain sensitive information via a web-service request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5342 The choice module in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 allows remote authenticated users to bypass intended access restrictions by visiting a URL to add or delete responses in the closed state. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5341 mod_scorm in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 mishandles availability dates, which allows remote authenticated users to bypass intended access restrictions and read SCORM contents via unspecified vectors. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5340 Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 does not consider the moodle/badges:viewbadges capability, which allows remote authenticated users to obtain sensitive badge information via a request involving (1) badges/overview.php or (2) badges/view.php. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5339 The core_enrol_get_enrolled_users web service in enrol/externallib.php in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 does not properly implement group-based access restrictions, which allows remote authenticated users to obtain sensitive course-participant information via a web-service request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5338 Multiple cross-site request forgery (CSRF) vulnerabilities in the lesson module in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 allow remote attackers to hijack the authentication of arbitrary users for requests to (1) mod/lesson/mediafile.php or (2) mod/lesson/view.php. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5337 Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 does not properly restrict the availability of Flowplayer, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted .swf file. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5336 Multiple cross-site scripting (XSS) vulnerabilities in the survey module in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 allow remote authenticated users to inject arbitrary web script or HTML by leveraging the student role and entering a crafted survey answer. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5335 Cross-site request forgery (CSRF) vulnerability in admin/registration/register.php in Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 allows remote attackers to hijack the authentication of administrators for requests that send statistics to an arbitrary hub URL. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5331 Moodle 2.9.x before 2.9.3 does not properly check the contact list before authorizing message transmission, which allows remote authenticated users to bypass intended access restrictions and conduct spam attacks via the messaging API. v2.9.1, v2.9.0, v2.9.2 Patch → NO_SAFE_VERSION
CVE-2015-5269 Cross-site scripting (XSS) vulnerability in group/overview.php in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 allows remote authenticated users to inject arbitrary web script or HTML via a modified grouping description. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5268 The rating component in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 mishandles group-based authorization checks, which allows remote authenticated users to obtain sensitive information by reading a rating value. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5267 lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 relies on the PHP mt_rand function to implement the random_string and complex_random_string functions, which makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5266 The enrol_meta_sync function in enrol/meta/locallib.php in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 allows remote authenticated users to obtain manager privileges in opportunistic circumstances by leveraging incorrect role processing during a long-running sync script. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5265 The wiki component in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 does not consider the mod/wiki:managefiles capability before authorizing file management, which allows remote authenticated users to delete arbitrary files by using a manage-files button in a text editor. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-5264 The lesson module in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 allows remote authenticated users to bypass intended access restrictions and enter additional answer attempts by leveraging the student role. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3275 Multiple cross-site scripting (XSS) vulnerabilities in the SCORM module in Moodle through 2.6.11, 2.7.x before 2.7.9, 2.8.x before 2.8.7, and 2.9.x before 2.9.1 allow remote attackers to inject arbitrary web script or HTML via a crafted organization name to (1) mod/scorm/player.php or (2) mod/scorm/prereqs.php. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3274 Cross-site scripting (XSS) vulnerability in the user_get_user_details function in user/lib.php in Moodle through 2.6.11, 2.7.x before 2.7.9, 2.8.x before 2.8.7, and 2.9.x before 2.9.1 allows remote attackers to inject arbitrary web script or HTML by leveraging absence of an external_format_text call in a web service. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3272 Open redirect vulnerability in the clean_param function in lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.9, 2.8.x before 2.8.7, and 2.9.x before 2.9.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an HTTP Referer header that has a substring match with a local URL. v2.7.0, v2.7.2, v2.7.1, v2.8.1, v2.8.0, v2.7.3, v2.8.2, v2.8.3 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3181 files/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 does not consider the moodle/user:manageownfiles capability before approving a private-file upload, which allows remote authenticated users to bypass intended file-management restrictions by using web services to perform uploads after this capability has been revoked. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3180 lib/navigationlib.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allows remote authenticated users to obtain sensitive course-structure information by leveraging access to a student account with a suspended enrolment. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3179 login/confirm.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allows remote authenticated users to bypass intended login restrictions by leveraging access to an unconfirmed suspended account. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3178 Cross-site scripting (XSS) vulnerability in the external_format_text function in lib/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML into an external application via a crafted string that is visible to web services. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3176 The account-confirmation feature in login/confirm.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allows remote attackers to obtain sensitive full-name information by attempting to self-register. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3175 Multiple open redirect vulnerabilities in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an error page that links to a URL from an HTTP Referer header. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-3174 mod/quiz/db/access.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 does not set the RISK_XSS bit for graders, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via crafted gradebook feedback during manual quiz grading. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2273 Cross-site scripting (XSS) vulnerability in mod/quiz/report/statistics/statistics_question_table.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the student role for a crafted quiz response. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2272 login/token.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 allows remote authenticated users to bypass a forced-password-change requirement by creating a web-services token. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2271 tag/user.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 does not consider the moodle/tag:flag capability before proceeding with a flaginappropriate action, which allows remote authenticated users to bypass intended access restrictions via the "Flag as inappropriate" feature. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2270 lib/moodlelib.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4, when the theme uses the blocks-regions feature, establishes the course state at an incorrect point in the login-validation process, which allows remote attackers to obtain sensitive course information via unspecified vectors. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2269 Multiple cross-site scripting (XSS) vulnerabilities in lib/javascript-static.js in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 allow remote authenticated users to inject arbitrary web script or HTML via a (1) alt or (2) title attribute in an IMG element. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2268 filter/urltolink/filter.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 allows remote authenticated users to cause a denial of service (CPU consumption or partial outage) via a crafted string that is matched against an improper regular expression. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2267 mdeploy.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 allows remote authenticated users to bypass intended access restrictions and extract archives to arbitrary directories via a crafted dataroot value. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-2266 message/index.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 does not consider the moodle/site:readallmessages capability before accessing arbitrary conversations, which allows remote authenticated users to obtain sensitive personal-contact and unread-message-count information via a modified URL. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-1493 Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0218 Cross-site request forgery (CSRF) vulnerability in auth/shibboleth/logout.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger a logout. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0217 filter/mediaplugin/filter.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to cause a denial of service (CPU consumption or partial outage) via a crafted string that is matched against an improper regular expression. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0216 access.php in the Lesson module in Moodle 2.8.x before 2.8.2 does not set the RISK_XSS bit for graders, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via crafted essay feedback. v2.8.1, v2.8.0 Patch → NO_SAFE_VERSION
CVE-2015-0215 calendar/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to obtain sensitive calendar-event information via a web-services request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0214 message/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to bypass a messaging-disabled setting via a web-services request, as demonstrated by a people-search request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0213 Multiple cross-site request forgery (CSRF) vulnerabilities in (1) editcategories.html and (2) editcategories.php in the Glossary module in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allow remote attackers to hijack the authentication of unspecified victims. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0212 Cross-site scripting (XSS) vulnerability in course/pending.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted course summary. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0211 mod/lti/ajax.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 does not consider the moodle/course:manageactivities and mod/lti:addinstance capabilities before proceeding with registered-tool list searches, which allows remote authenticated users to obtain sensitive information via requests to the LTI Ajax service. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-9060 The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-9059 lib/setup.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not provide charset information in HTTP headers, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 characters during interaction with AJAX scripts. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7848 lib/phpunit/bootstrap.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 allows remote attackers to obtain sensitive information via a direct request, which reveals the full path in an error message. v2.6.1, v2.6.0, v2.6.2, v2.7.0, v2.6.5, v2.6.4, v2.6.3, v2.7.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7847 iplookup/index.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote attackers to cause a denial of service (resource consumption) by triggering the calculation of an estimated latitude and longitude for an IP address. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7846 tag/tag_autocomplete.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not consider the moodle/tag:edit capability before adding a tag, which allows remote authenticated users to bypass intended access restrictions via an AJAX request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7845 The generate_password function in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not provide a sufficient number of possible temporary passwords, which allows remote attackers to obtain access via a brute-force attack. v2.6.1, v2.6.0, v2.5.2, v2.5.1, v2.5.0, v2.5.4, v2.5.3, v2.6.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7838 Multiple cross-site request forgery (CSRF) vulnerabilities in the Forum module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allow remote attackers to hijack the authentication of arbitrary users for requests that set a tracking preference within (1) mod/forum/deprecatedlib.php, (2) mod/forum/forum.js, (3) mod/forum/index.php, or (4) mod/forum/lib.php. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7837 mod/wiki/admin.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to remove wiki pages by leveraging delete access within a different subwiki. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7836 Multiple cross-site request forgery (CSRF) vulnerabilities in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allow remote attackers to hijack the authentication of arbitrary users for a (1) mod/lti/request_tool.php or (2) mod/lti/instructor_edit_tool_type.php request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7835 webservice/upload.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not ensure that a file upload is for a private or draft area, which allows remote authenticated users to upload files containing JavaScript, and consequently conduct cross-site scripting (XSS) attacks, by specifying the profile-picture area. v2.6.1, v2.6.0, v2.6.2, v2.7.0, v2.6.5, v2.6.4, v2.6.3, v2.7.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7834 mod/forum/externallib.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not verify group permissions, which allows remote authenticated users to access a forum via the forum_get_discussions web service. v2.6.1, v2.6.0, v2.6.2, v2.7.0, v2.6.5, v2.6.4, v2.6.3, v2.7.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7833 mod/data/edit.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 sets a certain group ID to zero upon a database-entry change, which allows remote authenticated users to obtain sensitive information by accessing the database after an edit by a teacher. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7832 mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-7830 Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php in the Feedback module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the mod/feedback:mapcourse capability to provide a searchcourse parameter. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3617 The forum_print_latest_discussions function in mod/forum/lib.php in Moodle through 2.4.11, 2.5.x before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2 allows remote authenticated users to bypass the individual answer-posting requirement without the mod/forum:viewqandawithoutposting capability, and discover an author's username, by leveraging the student role and visiting a Q&A forum. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3553 mod/forum/classes/post_form.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 does not enforce the moodle/site:accessallgroups capability requirement before proceeding with a post to all groups, which allows remote authenticated users to bypass intended access restrictions by leveraging two or more group memberships. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3551 Multiple cross-site scripting (XSS) vulnerabilities in the advanced-grading implementation in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) qualification or (2) rating field in a rubric. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3548 Multiple cross-site scripting (XSS) vulnerabilities in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allow remote attackers to inject arbitrary web script or HTML via vectors that trigger an AJAX exception dialog. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3547 Multiple cross-site scripting (XSS) vulnerabilities in badges/renderer.php in Moodle 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allow remote attackers to inject arbitrary web script or HTML via an external badge. v2.6.1, v2.6.0, v2.5.2, v2.5.1, v2.5.0, v2.5.4, v2.5.3, v2.6.2 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3546 Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 does not enforce certain capability requirements in (1) notes/index.php and (2) user/edit.php, which allows remote attackers to obtain potentially sensitive username and course information via a modified URL. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3545 Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to execute arbitrary code via a calculated question in a quiz. v2.4.1, v2.4.0, v2.6.1, v2.6.0, v2.5.2, v2.5.1, v2.5.0, v2.5.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3544 Cross-site scripting (XSS) vulnerability in user/profile.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to inject arbitrary web script or HTML via the Skype ID profile field. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3543 mod/imscp/locallib.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via a package with a manifest file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue affecting IMSCP resources and the IMSCC format. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3542 mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-3541 The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-2572 mod/assign/externallib.php in Moodle 2.6.x before 2.6.2 does not properly handle assignment web-service parameters, which might allow remote authenticated users to modify grade metadata via unspecified vectors. v2.6.1, v2.6.0 Patch → NO_SAFE_VERSION
CVE-2014-2571 Cross-site scripting (XSS) vulnerability in the quiz_question_tostring function in mod/quiz/editlib.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote authenticated users to inject arbitrary web script or HTML via a quiz question. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0218 Cross-site scripting (XSS) vulnerability in the URL downloader repository in repository/url/lib.php in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0217 enrol/index.php in Moodle 2.6.x before 2.6.3 does not check for the moodle/course:viewhiddencourses capability before listing hidden courses, which allows remote attackers to obtain sensitive name and summary information about these courses by leveraging the guest role and visiting a crafted URL. v2.6.1, v2.6.0, v2.6.2 Patch → NO_SAFE_VERSION
CVE-2014-0216 The My Home implementation in the block_html_pluginfile function in blocks/html/lib.php in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 does not properly restrict file access, which allows remote attackers to obtain sensitive information by visiting an HTML block. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0215 The blind-marking implementation in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 allows remote authenticated users to de-anonymize student identities by (1) using a screen reader or (2) reading the HTML source. v2.4.1, v2.4.0, v2.6.1, v2.6.0, v2.5.2, v2.5.1, v2.5.0, v2.5.4 (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0214 login/token.php in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 creates a MoodleMobile web-service token with an infinite lifetime, which makes it easier for remote attackers to hijack sessions via a brute-force attack. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0213 Multiple cross-site request forgery (CSRF) vulnerabilities in mod/assign/locallib.php in the Assignment subsystem in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 allow remote attackers to hijack the authentication of teachers for quick-grading requests. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0129 badges/mybadges.php in Moodle 2.5.x before 2.5.5 and 2.6.x before 2.6.2 does not properly track the user to whom a badge was issued, which allows remote authenticated users to modify the visibility of an arbitrary badge via unspecified vectors. v2.6.1, v2.6.0, v2.5.2, v2.5.1, v2.5.0, v2.5.4, v2.5.3 Patch → NO_SAFE_VERSION
CVE-2014-0127 The time-validation implementation in (1) mod/feedback/complete.php and (2) mod/feedback/complete_guest.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote authenticated users to bypass intended restrictions on starting a Feedback activity by choosing an unavailable time. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0126 Cross-site request forgery (CSRF) vulnerability in enrol/imsenterprise/importnow.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 allows remote attackers to hijack the authentication of administrators for requests that import an IMS Enterprise file. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0125 repository/alfresco/lib.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 places a session key in a URL, which allows remote attackers to bypass intended Alfresco Repository file restrictions by impersonating a file's owner. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0124 The identity-reporting implementations in mod/forum/renderer.php and mod/quiz/override_form.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 do not properly restrict the display of e-mail addresses, which allows remote authenticated users to obtain sensitive information by using the (1) Forum or (2) Quiz module. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0123 The wiki subsystem in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 does not properly restrict (1) view and (2) edit access, which allows remote authenticated users to perform wiki operations by leveraging the student role and using the Recent Activity block to reach the individual wiki of an arbitrary student. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2014-0122 mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 does not properly check for the mod/chat:chat capability during chat sessions, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by remaining in a chat session after an intra-session capability removal by an administrator. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-7341 Multiple cross-site scripting (XSS) vulnerabilities in Flowplayer Flash before 3.2.17, as used in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2, allow remote attackers to inject arbitrary web script or HTML by (1) providing a crafted playerId or (2) referencing an external domain, a related issue to CVE-2013-7342. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-3630 Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-2083 The MoodleQuickForm class in lib/formslib.php in Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly handle a certain array-element syntax, which allows remote attackers to bypass intended form-data filtering via a crafted request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-2082 Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not enforce capability requirements for reading blog comments, which allows remote attackers to obtain sensitive information via a crafted request. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-2081 Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not consider "don't send" attributes during hub registration, which allows remote hubs to obtain sensitive site information by reading form data. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-2080 The core_grade component in Moodle through 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly consider the existence of hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role and reading the Gradebook Overview report. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-1836 Moodle 2.x through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 does not properly manage privileges for WebDAV repositories, which allows remote authenticated users to read, modify, or delete arbitrary site-wide repositories by leveraging certain read access. v2.4.1, v2.4.0, v2.3.4 Patch → NO_SAFE_VERSION
CVE-2013-1835 Moodle 2.x through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 allows remote authenticated administrators to obtain sensitive information from the external repositories of arbitrary users by leveraging the login_as feature. v2.4.1, v2.4.0, v2.3.4 Patch → NO_SAFE_VERSION
CVE-2013-1834 notes/edit.php in Moodle 1.9.x through 1.9.19, 2.x through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 allows remote authenticated users to reassign notes via a modified (1) userid or (2) courseid field. v2.4.1, v2.4.0, v2.3.4 Patch → NO_SAFE_VERSION
CVE-2013-1833 Multiple cross-site scripting (XSS) vulnerabilities in the File Picker module in Moodle 2.x through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 allow remote authenticated users to inject arbitrary web script or HTML via a crafted filename. v2.4.1, v2.4.0, v2.3.4 Patch → NO_SAFE_VERSION
CVE-2013-1832 repository/webdav/lib.php in Moodle 2.x through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 includes the WebDAV password in the configuration form, which allows remote authenticated administrators to obtain sensitive information by configuring an instance. v2.4.1, v2.4.0, v2.3.4 Patch → NO_SAFE_VERSION
CVE-2013-1831 lib/setuplib.php in Moodle through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 allows remote attackers to obtain sensitive information via an invalid request, which reveals the absolute path in an exception message. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2013-1830 user/view.php in Moodle through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 does not enforce the forceloginforprofiles setting, which allows remote attackers to obtain sensitive course-profile information by leveraging the guest role, as demonstrated by a Google search. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2012-6112 classes/GoogleSpell.php in the PHP Spellchecker (aka Google Spellchecker) addon before 2.0.6.1 for TinyMCE, as used in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 and other products, does not properly handle control characters, which allows remote attackers to trigger arbitrary outbound HTTP requests via a crafted string. v2.4.0 Patch → NO_SAFE_VERSION
CVE-2012-6099 The moodle1 backup converter in backup/converter/moodle1/lib.php in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 does not properly validate pathnames, which allows remote authenticated users to read arbitrary files by leveraging the backup-restoration feature. v2.4.0 Patch → NO_SAFE_VERSION
CVE-2012-1159 Moodle before 2.2.2: Overview report allows users to see hidden courses dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2012-1157 Moodle before 2.2.2 has a default repository capabilities issue where all repositories are viewable by all users by default dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2011-4306 Cross-site scripting (XSS) vulnerability in course/editsection.html in Moodle 1.9.x before 1.9.14 allows remote authenticated users to inject arbitrary web script or HTML via crafted data. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2011-4301 The MoodleQuickForm class in the Forms Library in lib/formslib.php in Moodle 1.9.x before 1.9.14, 2.0.x before 2.0.5, and 2.1.x before 2.1.2 does not recognize Forms API setConstant operations, which allows remote attackers to submit unexpected form content by modifying the values of constant fields. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2011-4294 The error-message functionality in Moodle 1.9.x before 1.9.13, 2.0.x before 2.0.4, and 2.1.x before 2.1.1 does not ensure that a continuation link refers to an http or https URL for the local Moodle instance, which might allow attackers to trick users into visiting arbitrary web sites via unspecified vectors. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2011-4278 Cross-site scripting (XSS) vulnerability in the tag autocomplete functionality in Moodle 1.9.x before 1.9.11 and 2.0.x before 2.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2011-4203 CRLF injection vulnerability in calendar/set.php in the Calendar component in Moodle 1.9.x before 1.9.15, 2.0.x before 2.0.6, 2.1.x before 2.1.3, and 2.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors involving the url variable. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2010-2230 The KSES text cleaning filter in lib/weblib.php in Moodle before 1.8.13 and 1.9.x before 1.9.9 does not properly handle vbscript URIs, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via HTML input. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2008-1502 The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION
CVE-2006-4936 Moodle before 1.6.2 does not properly validate the module instance id when creating a course module object, which has unspecified impact and remote attack vectors. dev-MOODLE_34_STABLE, dev-MOODLE_23_STABLE, dev-MOODLE_24_STABLE, dev-MOODLE_25_STABLE, dev-MOODLE_26_STABLE, dev-MOODLE_27_STABLE, dev-MOODLE_28_STABLE, dev-MOODLE_29_STABLE (Show all) Patch → NO_SAFE_VERSION

Instantly see if these moodle/moodle vulnerabilities affect your code.

Scan for Free