Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6ed1-up33-77ex
Summary
Moodle vulnerable to symlink attack
`spell-check-logic.cgi` in Moodle 1.9 before 1.9.4, 1.8 before 1.8.8, 1.7 before 1.7.7 and 1.6 before 1.6.9 allows local users to overwrite arbitrary files via a symlink attack on the (1) `/tmp/spell-check-debug.log`, (2) `/tmp/spell-check-before`, or (3) `/tmp/spell-check-after` temporary file.
Aliases
0
alias CVE-2008-5153
1
alias GHSA-x7r4-26m9-hmgq
Fixed_packages
Affected_packages
0
url pkg:composer/moodle/moodle@1.6.0
purl pkg:composer/moodle/moodle@1.6.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ed1-up33-77ex
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/moodle/moodle@1.6.0
1
url pkg:composer/moodle/moodle@1.7.0
purl pkg:composer/moodle/moodle@1.7.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6ed1-up33-77ex
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/moodle/moodle@1.7.0
2
url pkg:composer/moodle/moodle@1.8.0
purl pkg:composer/moodle/moodle@1.8.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5brn-syjs-d3dp
1
vulnerability VCID-6ed1-up33-77ex
2
vulnerability VCID-738a-akbf-n7am
3
vulnerability VCID-9c4r-bgx4-nkgm
4
vulnerability VCID-k46m-rrbx-mkfc
5
vulnerability VCID-q4tm-cf8e-dbhs
6
vulnerability VCID-snna-e5qt-gfeh
7
vulnerability VCID-x2dc-hrjw-eqfh
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/moodle/moodle@1.8.0
3
url pkg:composer/moodle/moodle@1.9.0
purl pkg:composer/moodle/moodle@1.9.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5brn-syjs-d3dp
1
vulnerability VCID-5d4e-5ngu-mfgy
2
vulnerability VCID-6ed1-up33-77ex
3
vulnerability VCID-9c4r-bgx4-nkgm
4
vulnerability VCID-bav3-bmte-w3gr
5
vulnerability VCID-k46m-rrbx-mkfc
6
vulnerability VCID-kr6a-2jmv-t7dh
7
vulnerability VCID-mp12-mrm4-rbby
8
vulnerability VCID-q4tm-cf8e-dbhs
9
vulnerability VCID-snna-e5qt-gfeh
10
vulnerability VCID-sq2p-cv3p-gka5
11
vulnerability VCID-x2dc-hrjw-eqfh
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/moodle/moodle@1.9.0
References
0
reference_url http://lists.debian.org/debian-devel/2008/08/msg00347.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.debian.org/debian-devel/2008/08/msg00347.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5153.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5153.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5153
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08666
published_at 2026-05-07T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08626
published_at 2026-04-24T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08603
published_at 2026-04-12T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.0859
published_at 2026-04-13T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.0848
published_at 2026-04-16T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08466
published_at 2026-04-18T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08615
published_at 2026-04-21T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08579
published_at 2026-04-26T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08586
published_at 2026-04-29T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08524
published_at 2026-05-05T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08531
published_at 2026-04-07T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08559
published_at 2026-04-02T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.08611
published_at 2026-04-04T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08604
published_at 2026-04-08T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08628
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5153
3
reference_url http://secunia.com/advisories/33955
reference_id
reference_type
scores
url http://secunia.com/advisories/33955
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46708
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46708
5
reference_url https://github.com/moodle/moodle
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moodle/moodle
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5153
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2008-5153
7
reference_url https://web.archive.org/web/20090821033319/http://secunia.com/advisories/33955
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20090821033319/http://secunia.com/advisories/33955
8
reference_url https://web.archive.org/web/20110511083352/http://uvw.ru/report.sid.txt
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20110511083352/http://uvw.ru/report.sid.txt
9
reference_url https://web.archive.org/web/20141121115305/http://www.securityfocus.com/bid/32402
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20141121115305/http://www.securityfocus.com/bid/32402
10
reference_url http://uvw.ru/report.sid.txt
reference_id
reference_type
scores
url http://uvw.ru/report.sid.txt
11
reference_url http://www.debian.org/security/2009/dsa-1724
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2009/dsa-1724
12
reference_url http://www.securityfocus.com/bid/32402
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32402
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=472117
reference_id 472117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=472117
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
15
reference_url https://github.com/advisories/GHSA-x7r4-26m9-hmgq
reference_id GHSA-x7r4-26m9-hmgq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x7r4-26m9-hmgq
16
reference_url https://usn.ubuntu.com/791-1/
reference_id USN-791-1
reference_type
scores
url https://usn.ubuntu.com/791-1/
Weaknesses
0
cwe_id 59
name Improper Link Resolution Before File Access ('Link Following')
description The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
1
cwe_id 377
name Insecure Temporary File
description Creating and using insecure temporary files can leave application and system data vulnerable to attack.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6ed1-up33-77ex