moodle vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the moodle package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Access Control

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
SQL Injection

*
  • M
Information Exposure

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Improper Access Control

*
  • L
Cross-site Request Forgery (CSRF)

*
  • L
Access Restriction Bypass

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
CVE-2015-3272

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • L
Cross-site Scripting (XSS)

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Access Restriction Bypass

*
  • M
Directory Traversal

*
  • M
Cross-site Request Forgery (CSRF)

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
CVE-2015-3175

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Management Errors

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Code

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Management Errors

*
  • M
Improper Access Control

*
  • L
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Information Exposure

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Management Errors

*
  • M
Information Exposure

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Credentials Management

*
  • M
Improper Input Validation

*
  • M
Access Restriction Bypass

*
  • M
Improper Authentication

*
  • M
Arbitrary Code Injection

*
  • M
Cross-site Scripting (XSS)

*
  • M
Arbitrary Code Injection

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
CVE-2014-2054

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authentication

*
  • M
Cross-site Request Forgery (CSRF)

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*