Page 3 of 12 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_status was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system. Se presenta una vulnerabilidad de inyección SQL explotable en la parte autenticada de Forma LMS versión 2.2.1. La URL del archivo /appLms/ajax.server.php y el parámetro filter_status sufren inyecciones SQL y podrían ser explotados por atacantes autenticados. • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_cat was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system. Se presenta una vulnerabilidad de inyección SQL explotable en la parte autenticada de Forma LMS versión 2.2.1. La URL del archivo /appLms/ajax.server.php y el parámetro filter_cat sufren inyecciones SQL y podrían ser explotadas por atacantes autenticados. • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •