Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/14941?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14941?format=api", "vulnerability_id": "VCID-1m87-uyah-9kat", "summary": "Moodle Double-Caches Content, Potentially Writing to a File System's Tmp Directory\nThe theme implementation in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 triggers duplicate caching of Cascading Style Sheets (CSS) and JavaScript content, which allows remote attackers to bypass intended access restrictions and write to an operating-system temporary directory via unspecified vectors.", "aliases": [ { "alias": "CVE-2011-4293" }, { "alias": "GHSA-wxvp-8q8h-r6rr" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/49933?format=api", "purl": "pkg:composer/moodle/moodle@2.0.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1m87-uyah-9kat" }, { "vulnerability": "VCID-364d-q9tm-4ket" }, { "vulnerability": "VCID-5u1f-df9m-x3en" }, { "vulnerability": "VCID-5vy6-nqht-hfa5" }, { "vulnerability": "VCID-7see-ex7a-9fdr" }, { "vulnerability": "VCID-8d1d-8x82-n7fj" }, { "vulnerability": "VCID-8q6b-cnmp-n3gv" }, { "vulnerability": "VCID-8y2x-aqub-9ycv" }, { "vulnerability": "VCID-9ffw-35y1-9kcc" }, { "vulnerability": "VCID-ajfk-n1qs-hqdp" }, { "vulnerability": "VCID-bav3-bmte-w3gr" }, { "vulnerability": "VCID-bgbv-4kb1-3bhg" }, { "vulnerability": "VCID-e1jc-m337-k7bj" }, { "vulnerability": "VCID-era2-gy4n-6kdx" }, { "vulnerability": "VCID-f6mk-8r56-1yfe" }, { "vulnerability": "VCID-j9xy-97ps-7fht" }, { "vulnerability": "VCID-kr6a-2jmv-t7dh" }, { "vulnerability": "VCID-pj1q-4uex-e3d3" }, { "vulnerability": "VCID-pmh4-7sf4-pkec" }, { "vulnerability": "VCID-pswr-m2yd-tkfb" }, { "vulnerability": "VCID-qpns-23xm-qyhv" }, { "vulnerability": "VCID-rqx8-nq76-sugw" }, { "vulnerability": "VCID-rsgm-pmc9-dfbb" }, { "vulnerability": "VCID-t242-kuj7-zfg4" }, { "vulnerability": "VCID-t5ww-gsnd-3ycg" }, { "vulnerability": "VCID-u9f3-sbjk-pygw" }, { "vulnerability": "VCID-ut3x-gmbz-ukem" }, { "vulnerability": "VCID-vf82-m9gw-kud2" }, { "vulnerability": "VCID-yrzk-x3uu-zkcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/moodle/moodle@2.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/49935?format=api", "purl": "pkg:composer/moodle/moodle@2.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1m87-uyah-9kat" }, { "vulnerability": "VCID-364d-q9tm-4ket" }, { "vulnerability": "VCID-5vy6-nqht-hfa5" }, { "vulnerability": "VCID-7see-ex7a-9fdr" }, { "vulnerability": "VCID-8q6b-cnmp-n3gv" }, { "vulnerability": "VCID-du8m-h228-cff3" }, { "vulnerability": "VCID-e1jc-m337-k7bj" }, { "vulnerability": "VCID-hxhr-sxkm-nka6" }, { "vulnerability": "VCID-kdqf-c5py-sybt" }, { "vulnerability": "VCID-pj1q-4uex-e3d3" }, { "vulnerability": "VCID-pswr-m2yd-tkfb" }, { "vulnerability": "VCID-qjdf-s39r-5bdb" }, { "vulnerability": "VCID-t242-kuj7-zfg4" }, { "vulnerability": "VCID-t5ww-gsnd-3ycg" }, { "vulnerability": "VCID-u9f3-sbjk-pygw" }, { "vulnerability": "VCID-uhws-64fm-hybk" }, { "vulnerability": "VCID-vf82-m9gw-kud2" }, { "vulnerability": "VCID-xu4e-svgd-cygq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/moodle/moodle@2.1.0" } ], "references": [ { "reference_url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=e1c2a211f259821910be2cba23679d4176fb00a3", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=e1c2a211f259821910be2cba23679d4176fb00a3" }, { "reference_url": "http://moodle.org/mod/forum/discuss.php?d=182736", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://moodle.org/mod/forum/discuss.php?d=182736" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/11/14/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://openwall.com/lists/oss-security/2011/11/14/1" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4124", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41423", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41408", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41328", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4142", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41448", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41375", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41425", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4293" }, { "reference_url": "https://github.com/moodle/moodle", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle" }, { "reference_url": "https://github.com/moodle/moodle/commit/05f4555422278190ec24a88466ac43c914a7e5d6", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle/commit/05f4555422278190ec24a88466ac43c914a7e5d6" }, { "reference_url": "https://github.com/moodle/moodle/commit/9a380fbb53429713b3c422a3146456dc97205329", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle/commit/9a380fbb53429713b3c422a3146456dc97205329" }, { "reference_url": "https://github.com/moodle/moodle/commit/e1c2a211f259821910be2cba23679d4176fb00a3", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/moodle/moodle/commit/e1c2a211f259821910be2cba23679d4176fb00a3" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4293", "reference_id": "CVE-2011-4293", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4293" }, { "reference_url": "https://github.com/advisories/GHSA-wxvp-8q8h-r6rr", "reference_id": "GHSA-wxvp-8q8h-r6rr", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-wxvp-8q8h-r6rr" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 264, "name": "Permissions, Privileges, and Access Controls", "description": "Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 379, "name": "Creation of Temporary File in Directory with Insecure Permissions", "description": "The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file." } ], "exploits": [], "severity_range_score": "4.0 - 6.9", "exploitability": "0.5", "weighted_severity": "6.2", "risk_score": 3.1, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1m87-uyah-9kat" }