moodle vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the moodle package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Access Control

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
SQL Injection

*
  • M
Information Exposure

*
  • L
Access Restriction Bypass

*
  • L
Information Exposure

*
  • L
Cross-site Scripting (XSS)

*
  • L
Improper Access Control

*
  • L
Cross-site Request Forgery (CSRF)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
CVE-2015-3272

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
CVE-2015-3175

*
  • M
Code

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Directory Traversal

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • L
Information Exposure

*
  • M
Resource Management Errors

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Resource Management Errors

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Access Control

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Access Restriction Bypass

*
  • M
Information Exposure

*
  • M
Access Restriction Bypass

*
  • M
Credentials Management

*
  • M
Resource Management Errors

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Arbitrary Code Injection

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Arbitrary Code Injection

*
  • M
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Access Restriction Bypass

*
  • M
Improper Authentication

*
  • M
Information Exposure

*
  • M
CVE-2014-2054

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Information Exposure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • M
Improper Authentication

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • M
Access Restriction Bypass

*
  • L
Access Restriction Bypass

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Request Forgery (CSRF)

*
  • L
Access Restriction Bypass

*