3 results (0.013 seconds)

CVSS: 6.0EPSS: 0%CPEs: 4EXPL: 2

Multiple SQL injection vulnerabilities in the save_connection function in lib/lib.iotask.php in the iotask module in DoceboLMS 4.0.4 and earlier allow remote authenticated users with admin or teacher privileges to execute arbitrary SQL commands via the (1) coursereportuiconfig[name] or (2) coursereportuiconfig[description] parameters to index.php. Múltiples vulnerabilidades de inyección SQL en la función save_connection en el módulo lib/lib.iotask.php in the iotask en DoceboLMS v4.0.4 y anteriores que permite usuarios remotos autenticados con privilegios de administrador o profesor ejecutar comandos SQL arbitrarios a través de los párametros (1) coursereportuiconfig[name] o (2) coursereportuiconfig[description] a index.php. • https://www.exploit-db.com/exploits/18224 http://www.exploit-db.com/exploits/18224 https://exchange.xforce.ibmcloud.com/vulnerabilities/71720 https://twitter.com/claudioerba73/status/143383179162685440 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to list arbitrary files and directories via ".." sequences in the Type parameter in a GetFoldersAndFiles command. • https://www.exploit-db.com/exploits/1356 http://rgod.altervista.org/docebo204_xpl.html http://secunia.com/advisories/1015308 http://secunia.com/advisories/17896 http://securitytracker.com/id?1015308 http://www.osvdb.org/21464 http://www.securityfocus.com/bid/15742 http://www.vupen.com/english/advisories/2005/2771 https://exchange.xforce.ibmcloud.com/vulnerabilities/23518 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 3

connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to execute arbitrary PHP by using the FileUpload command to upload a file that appears to be an image but contains PHP script. • http://rgod.altervista.org/docebo204_xpl.html http://secunia.com/advisories/1015308 http://secunia.com/advisories/17896 http://securitytracker.com/id?1015308 http://www.osvdb.org/21465 http://www.securityfocus.com/bid/15744 http://www.vupen.com/english/advisories/2005/2771 https://exchange.xforce.ibmcloud.com/vulnerabilities/23519 •