CVE-2011-5135 – Docebo Lms 4.0.4 - 'Messages' Remote Code Execution
https://notcve.org/view.php?id=CVE-2011-5135
Multiple SQL injection vulnerabilities in the save_connection function in lib/lib.iotask.php in the iotask module in DoceboLMS 4.0.4 and earlier allow remote authenticated users with admin or teacher privileges to execute arbitrary SQL commands via the (1) coursereportuiconfig[name] or (2) coursereportuiconfig[description] parameters to index.php. Múltiples vulnerabilidades de inyección SQL en la función save_connection en el módulo lib/lib.iotask.php in the iotask en DoceboLMS v4.0.4 y anteriores que permite usuarios remotos autenticados con privilegios de administrador o profesor ejecutar comandos SQL arbitrarios a través de los párametros (1) coursereportuiconfig[name] o (2) coursereportuiconfig[description] a index.php. • https://www.exploit-db.com/exploits/18224 http://www.exploit-db.com/exploits/18224 https://exchange.xforce.ibmcloud.com/vulnerabilities/71720 https://twitter.com/claudioerba73/status/143383179162685440 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2005-4095 – DoceboLms 2.0.4 - 'connector.php' Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2005-4095
Directory traversal vulnerability in connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to list arbitrary files and directories via ".." sequences in the Type parameter in a GetFoldersAndFiles command. • https://www.exploit-db.com/exploits/1356 http://rgod.altervista.org/docebo204_xpl.html http://secunia.com/advisories/1015308 http://secunia.com/advisories/17896 http://securitytracker.com/id?1015308 http://www.osvdb.org/21464 http://www.securityfocus.com/bid/15742 http://www.vupen.com/english/advisories/2005/2771 https://exchange.xforce.ibmcloud.com/vulnerabilities/23518 •
CVE-2005-4094
https://notcve.org/view.php?id=CVE-2005-4094
connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to execute arbitrary PHP by using the FileUpload command to upload a file that appears to be an image but contains PHP script. • http://rgod.altervista.org/docebo204_xpl.html http://secunia.com/advisories/1015308 http://secunia.com/advisories/17896 http://securitytracker.com/id?1015308 http://www.osvdb.org/21465 http://www.securityfocus.com/bid/15744 http://www.vupen.com/english/advisories/2005/2771 https://exchange.xforce.ibmcloud.com/vulnerabilities/23519 •