moodle vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the moodle package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Improper Access Control

*
  • M
SQL Injection

*
  • M
Information Exposure

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • L
Access Restriction Bypass

*
  • L
Improper Access Control

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
CVE-2015-3272

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Information Exposure

*
  • M
Improper Access Control

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
CVE-2015-3175

*
  • M
Code

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • M
Resource Management Errors

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Resource Management Errors

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Improper Input Validation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Credentials Management

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Resource Management Errors

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Access Restriction Bypass

*
  • M
Arbitrary Code Injection

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authentication

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Arbitrary Code Injection

*
  • M
Information Exposure

*
  • M
CVE-2014-2054

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Information Exposure

*
  • M
Improper Authentication

*
  • M
Information Exposure

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*