{"id":"CVE-2016-3731","details":"Moodle 3.0 through 3.0.3, 2.9 through 2.9.5, and 2.8 through 2.8.11 allows remote attackers to obtain the names of hidden forums and forum discussions.","modified":"2026-04-10T03:51:04.507057Z","published":"2017-04-20T21:59:00.750Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/05/17/4"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035902"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335933"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/moodle/moodle","events":[{"introduced":"0"},{"last_affected":"21db825b19e84bb24c0661b551a5069970e143c4"},{"introduced":"0"},{"last_affected":"296b602f2cd751cac5de6bda553db381432da704"},{"introduced":"0"},{"last_affected":"f2c730fecfcc9850ea39cf53186f8b3f0a114ae1"},{"introduced":"0"},{"last_affected":"68b1fd2c5500284e0afe8fda78b2e9551eb697a6"},{"introduced":"0"},{"last_affected":"f4dc567e79e871b7e0aab64dd39706ac112094ac"},{"introduced":"0"},{"last_affected":"be3e6f62029e26a125871d4b6bf42156cb7e512c"},{"introduced":"0"},{"last_affected":"dc7b914677dcdded287671ca9eb92e0e95e9f2a0"},{"introduced":"0"},{"last_affected":"1f2979d0e51c2d2a8dc535b9c84b7364016fe8d4"},{"introduced":"0"},{"last_affected":"e494078a27ae8fd2f91c908d12911adb3c32e6ee"},{"introduced":"0"},{"last_affected":"ae1854f55c265e2e0966de4b81636c31c641b029"},{"introduced":"0"},{"last_affected":"2e8e92b0f1a21a77aadcb320d358273855193cd0"},{"introduced":"0"},{"last_affected":"3ed9d1c176a0ffabc2b395a026e80f9435775c7d"},{"introduced":"0"},{"last_affected":"cbd90c01c120a199ca53b5965785c55f88834cdc"},{"introduced":"0"},{"last_affected":"c948f378b9d7a819d2d430894fa9840cfe9b5590"},{"introduced":"0"},{"last_affected":"b7d2ed3004ba4f165aba55e1a235f02d55f76624"},{"introduced":"0"},{"last_affected":"3a325f777f9d43fda5c1dfb1287a8bf6d8e61938"},{"introduced":"0"},{"last_affected":"d16cdbd81fbf07e33f55c26f0569ee1424126b59"},{"introduced":"0"},{"last_affected":"b0f0573e743428c7528c58b4d89f9aa5caeb376e"},{"introduced":"0"},{"last_affected":"6114fab93b414fcfa107d5a8fa2b35bc99d3464e"},{"introduced":"0"},{"last_affected":"9382ac38d60bee1226e3ba13906770552bea6012"},{"introduced":"0"},{"last_affected":"4cef723c228d3f0e4848551df9b27464853f27c5"},{"introduced":"0"},{"last_affected":"1533fca4b5c398597dc22ee8421b11754b21dc19"},{"introduced":"0"},{"last_affected":"bcf2ea710cdae055fddbecd0618087e071c0559a"},{"introduced":"0"},{"last_affected":"20949f47fea1835a9a86a26809c8f9817def893f"},{"introduced":"0"},{"last_affected":"62e799ac84232c065790c8cab0f841e43ae038e0"},{"introduced":"0"},{"last_affected":"5d35d7b8843f5f4571dd0b10ad1490cd524e67da"},{"introduced":"0"},{"last_affected":"97dd32edd69cd9d034b56b1f2c3ffe2f2e0832e9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.8.0"},{"introduced":"0"},{"last_affected":"2.8.1"},{"introduced":"0"},{"last_affected":"2.8.2"},{"introduced":"0"},{"last_affected":"2.8.3"},{"introduced":"0"},{"last_affected":"2.8.4"},{"introduced":"0"},{"last_affected":"2.8.5"},{"introduced":"0"},{"last_affected":"2.8.6"},{"introduced":"0"},{"last_affected":"2.8.7"},{"introduced":"0"},{"last_affected":"2.8.8"},{"introduced":"0"},{"last_affected":"2.8.9"},{"introduced":"0"},{"last_affected":"2.8.10"},{"introduced":"0"},{"last_affected":"2.8.11"},{"introduced":"0"},{"last_affected":"2.9.0"},{"introduced":"0"},{"last_affected":"2.9.1"},{"introduced":"0"},{"last_affected":"2.9.2"},{"introduced":"0"},{"last_affected":"2.9.3"},{"introduced":"0"},{"last_affected":"2.9.4"},{"introduced":"0"},{"last_affected":"2.9.5"},{"introduced":"0"},{"last_affected":"3.0.0"},{"introduced":"0"},{"last_affected":"3.0.0-beta"},{"introduced":"0"},{"last_affected":"3.0.0-rc1"},{"introduced":"0"},{"last_affected":"3.0.0-rc2"},{"introduced":"0"},{"last_affected":"3.0.0-rc3"},{"introduced":"0"},{"last_affected":"3.0.0-rc4"},{"introduced":"0"},{"last_affected":"3.0.1"},{"introduced":"0"},{"last_affected":"3.0.2"},{"introduced":"0"},{"last_affected":"3.0.3"}]}}],"versions":["v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9","v1.1.0","v1.1.1","v1.2.0","v1.2.1","v1.3.0","v2.0.0","v2.0.0-rc1","v2.0.0-rc2","v2.0.1","v2.1.0","v2.2.0","v2.2.0-beta","v2.2.0-rc1","v2.3.0","v2.3.0-beta","v2.3.0-rc1","v2.4.0","v2.4.0-beta","v2.4.0-rc1","v2.5.0","v2.5.0-beta","v2.5.0-rc1","v2.6.0","v2.6.0-beta","v2.6.0-rc1","v2.7.0","v2.7.0-beta","v2.7.0-rc1","v2.7.0-rc2","v2.8.0","v2.8.0-beta","v2.8.0-rc1","v2.8.0-rc2","v2.8.1","v2.8.10","v2.8.11","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v2.8.6","v2.8.7","v2.8.8","v2.8.9","v2.9.0","v2.9.0-beta","v2.9.0-rc1","v2.9.0-rc2","v2.9.1","v2.9.2","v2.9.3","v2.9.4","v2.9.5","v3.0.0","v3.0.0-beta","v3.0.0-rc1","v3.0.0-rc2","v3.0.0-rc3","v3.0.0-rc4","v3.0.1","v3.0.2","v3.0.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3731.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}