10
Understanding Vulnerabilities
In the previous chapter, we learned how a threat actor might test the security of our Moodle installation and exploit it for vulnerabilities. Bug hunters will use these same tools and processes to find security issues. But once they are discovered, then how are they tracked? How can we be notified when a new vulnerability is identified? In this chapter, we’ll learn how. We will investigate vulnerability tracking – both in general and for the Moodle project in particular. Through a better understanding of vulnerabilities, we can be better protected against them.
In this chapter, you will do the following:
- Learn how to keep up to date with any security patches and enhancements
- Explore both freely and commercially ...
Get Moodle 4 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.