Search for vulnerabilities
Vulnerability ID | VCID-entn-ceve-t7fc |
Aliases |
CVE-2016-3729
GHSA-g96h-wvrm-c2ww |
Summary | Moodle Improper Access Control The user editing form in Moodle 3.0 through 3.0.3, 2.9 through 2.9.5, 2.8 through 2.8.11, 2.7 through 2.7.13, and earlier allows remote authenticated users to edit profile fields locked by the administrator. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 6.2 |
Risk | 3.1 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
epss | 0.00379 | https://api.first.org/data/v1/epss?cve=CVE-2016-3729 |
epss | 0.00379 | https://api.first.org/data/v1/epss?cve=CVE-2016-3729 |
cvssv3.1 | 6.5 | https://bugzilla.redhat.com/show_bug.cgi?id=1335933 |
generic_textual | MODERATE | https://bugzilla.redhat.com/show_bug.cgi?id=1335933 |
cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-g96h-wvrm-c2ww |
cvssv3.1 | 6.5 | https://github.com/moodle/moodle |
generic_textual | MODERATE | https://github.com/moodle/moodle |
cvssv3.1 | 6.5 | https://nvd.nist.gov/vuln/detail/CVE-2016-3729 |
generic_textual | MODERATE | https://nvd.nist.gov/vuln/detail/CVE-2016-3729 |
cvssv3.1 | 6.5 | http://www.openwall.com/lists/oss-security/2016/05/17/4 |
generic_textual | MODERATE | http://www.openwall.com/lists/oss-security/2016/05/17/4 |
cvssv3.1 | 6.5 | http://www.securitytracker.com/id/1035902 |
generic_textual | MODERATE | http://www.securitytracker.com/id/1035902 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.58574 |
EPSS Score | 0.00379 |
Published At | June 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:27:58.370459+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g96h-wvrm-c2ww/GHSA-g96h-wvrm-c2ww.json | 36.1.3 |