5 results (0.003 seconds)

CVSS: 6.0EPSS: 0%CPEs: 4EXPL: 2

Multiple SQL injection vulnerabilities in the save_connection function in lib/lib.iotask.php in the iotask module in DoceboLMS 4.0.4 and earlier allow remote authenticated users with admin or teacher privileges to execute arbitrary SQL commands via the (1) coursereportuiconfig[name] or (2) coursereportuiconfig[description] parameters to index.php. Múltiples vulnerabilidades de inyección SQL en la función save_connection en el módulo lib/lib.iotask.php in the iotask en DoceboLMS v4.0.4 y anteriores que permite usuarios remotos autenticados con privilegios de administrador o profesor ejecutar comandos SQL arbitrarios a través de los párametros (1) coursereportuiconfig[name] o (2) coursereportuiconfig[description] a index.php. • https://www.exploit-db.com/exploits/18224 http://www.exploit-db.com/exploits/18224 https://exchange.xforce.ibmcloud.com/vulnerabilities/71720 https://twitter.com/claudioerba73/status/143383179162685440 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

DoceboLMS 4.0.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by views/dummy/show.php and certain other files. DoceboLMS v4.0.4 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con views/dummy/show.php y algunos otros archivos. • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/DoceboLMS_4.0.4 http://www.openwall.com/lists/oss-security/2011/06/27/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 14%CPEs: 1EXPL: 1

Multiple PHP remote file inclusion vulnerabilities in Docebo LMS 2.05 allow remote attackers to execute arbitrary PHP code via a URL in the lang parameter to (1) modules/credits/business.php, (2) modules/credits/credits.php, or (3) modules/credits/help.php. • https://www.exploit-db.com/exploits/1828 http://secunia.com/advisories/20298 http://securitytracker.com/id?1016159 http://www.securityfocus.com/archive/1/435110/30/4710/threaded http://www.securityfocus.com/bid/18110 http://www.vupen.com/english/advisories/2006/1978 https://exchange.xforce.ibmcloud.com/vulnerabilities/26685 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to list arbitrary files and directories via ".." sequences in the Type parameter in a GetFoldersAndFiles command. • https://www.exploit-db.com/exploits/1356 http://rgod.altervista.org/docebo204_xpl.html http://secunia.com/advisories/1015308 http://secunia.com/advisories/17896 http://securitytracker.com/id?1015308 http://www.osvdb.org/21464 http://www.securityfocus.com/bid/15742 http://www.vupen.com/english/advisories/2005/2771 https://exchange.xforce.ibmcloud.com/vulnerabilities/23518 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 3

connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to execute arbitrary PHP by using the FileUpload command to upload a file that appears to be an image but contains PHP script. • http://rgod.altervista.org/docebo204_xpl.html http://secunia.com/advisories/1015308 http://secunia.com/advisories/17896 http://securitytracker.com/id?1015308 http://www.osvdb.org/21465 http://www.securityfocus.com/bid/15744 http://www.vupen.com/english/advisories/2005/2771 https://exchange.xforce.ibmcloud.com/vulnerabilities/23519 •