Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
moodle / moodle
You can search for specific versions with
https://synscan.net/product/moodle/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2011-4303
Low
Jul 11, 2012
== 2.0.2
== 2.0.1
== 2.0.4
== 2.0.3
== 2.1.1
== 2.0.0
== 2.1.0
CVE-2011-4203
Medium
Dec 22, 2011
== 2.0.2
== 1.9.4
== 1.9.1
== 1.9.6
== 1.9.9
== 2.0.1
== 1.9.11
== 2.1.2
== 2.0.4
== 1.9.2
== 1.9.12
== 1.9.10
== 2.0.3
== 2.1.1
== 1.9.3
== 2.0.5
== 1.9.13
== 1.9.5
== 1.9.14
== 1.9.8
== 1.9.7
== 2.0.0
== 2.1.0
== 2.2.0
CVE-2011-3757
Medium
Sep 23, 2011
== 2.0.1
CVE-2010-2228
Low
Jun 28, 2010
== 1.5.2
== 1.8.8
== 1.6.1
== 1.8.2
== 1.2.1
== 1.4.2
== 1.6.8
== 1.6.5
== 1.3.3
== 1.4.3
<= 1.8.12
== 1.4.5
== 1.7.6
== 1.6.2
== 1.8.6
== 1.7.1
== 1.8.5
== 1.8.3
== 1.3.2
== 1.8.9
== 1.8.7
== 1.8.10
== 1.6.4
== 1.1.1
== 1.3.1
== 1.6.7
== 1.4.4
== 1.7.3
== 1.7.2
== 1.5.3
== 1.6.3
== 1.8.11
== 1.6.6
== 1.5
== 1.4.1
== 1.7.5
== 1.5.1
== 1.3.4
== 1.8.4
== 1.8.1
== 1.7.4
== 1.2.0
== 1.3.0
== 1.6.0
== 1.5.0-beta
== 1.9.4
== 1.9.1
== 1.9.6
== 1.9.2
== 1.9.3
== 1.9.5
== 1.9.8
== 1.9.7
CVE-2010-2229
Low
Jun 28, 2010
== 1.5.2
== 1.8.8
== 1.6.1
== 1.8.2
== 1.2.1
== 1.4.2
== 1.6.8
== 1.6.5
== 1.3.3
== 1.4.3
<= 1.8.12
== 1.4.5
== 1.7.6
== 1.6.2
== 1.8.6
== 1.7.1
== 1.8.5
== 1.8.3
== 1.3.2
== 1.8.9
== 1.8.7
== 1.8.10
== 1.6.4
== 1.1.1
== 1.3.1
== 1.6.7
== 1.4.4
== 1.7.3
== 1.7.2
== 1.5.3
== 1.6.3
== 1.8.11
== 1.6.6
== 1.5
== 1.4.1
== 1.7.5
== 1.5.1
== 1.3.4
== 1.8.4
== 1.8.1
== 1.7.4
== 1.2.0
== 1.3.0
== 1.6.0
== 1.5.0-beta
== 1.9.4
== 1.9.1
== 1.9.6
== 1.9.2
== 1.9.3
== 1.9.5
== 1.9.8
== 1.9.7
CVE-2010-2230
Low
Jun 28, 2010
== 1.5.2
== 1.8.8
== 1.6.1
== 1.8.2
== 1.2.1
== 1.4.2
== 1.6.8
== 1.6.5
== 1.3.3
== 1.4.3
<= 1.8.12
== 1.4.5
== 1.7.6
== 1.6.2
== 1.8.6
== 1.7.1
== 1.8.5
== 1.8.3
== 1.3.2
== 1.8.9
== 1.8.7
== 1.8.10
== 1.6.4
== 1.1.1
== 1.3.1
== 1.6.7
== 1.4.4
== 1.7.3
== 1.7.2
== 1.5.3
== 1.6.3
== 1.8.11
== 1.6.6
== 1.5
== 1.4.1
== 1.7.5
== 1.5.1
== 1.3.4
== 1.8.4
== 1.8.1
== 1.7.4
== 1.2.0
== 1.3.0
== 1.6.0
== 1.5.0-beta
== 1.9.4
== 1.9.1
== 1.9.6
== 1.9.2
== 1.9.3
== 1.9.5
== 1.9.8
== 1.9.7
CVE-2010-2231
Medium
Jun 28, 2010
== 1.5.2
== 1.8.8
== 1.6.1
== 1.8.2
== 1.2.1
== 1.4.2
== 1.6.8
== 1.6.5
== 1.3.3
== 1.4.3
<= 1.8.12
== 1.4.5
== 1.7.6
== 1.6.2
== 1.8.6
== 1.7.1
== 1.8.5
== 1.8.3
== 1.3.2
== 1.8.9
== 1.8.7
== 1.8.10
== 1.6.4
== 1.1.1
== 1.3.1
== 1.6.7
== 1.4.4
== 1.7.3
== 1.7.2
== 1.5.3
== 1.6.3
== 1.8.11
== 1.6.6
== 1.5
== 1.4.1
== 1.7.5
== 1.5.1
== 1.3.4
== 1.8.4
== 1.8.1
== 1.7.4
== 1.2.0
== 1.3.0
== 1.6.0
== 1.5.0-beta
== 1.9.4
== 1.9.1
== 1.9.6
== 1.9.2
== 1.9.3
== 1.9.5
== 1.9.8
== 1.9.7
CVE-2010-1613
Medium
Apr 29, 2010
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
CVE-2010-1614
Low
Apr 29, 2010
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
CVE-2010-1615
High
Apr 29, 2010
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
‹
›
‹
1
2
...
54
55
56
...
60
61
›