Page 4 of 35 results (0.007 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

21 Dec 2018 — Chamilo LMS version 1.11.8 contains XSS in main/social/group_view.php in the social groups tool, allowing authenticated users to affect other users, under specific conditions of permissions granted by administrators. This is considered "low risk" due to the nature of the feature it exploits. Chamilo LMS 1.11.8 contiene Cross-Site Scripting (XSS) en main/social/group_view.php en la herramienta de grupos sociales, lo que permite que usuarios autenticados afecten a otros usuarios en condiciones específicas de ... • https://github.com/chamilo/chamilo-lms/commit/5e61c2b0fcc938ca687b8d4e593b1500aa52a034 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

21 Dec 2018 — Chamilo LMS version 1.11.8 contains a main/inc/lib/CoursesAndSessionsCatalog.class.php SQL injection, allowing users with access to the sessions catalogue (which may optionally be made public) to extract and/or modify database information. Chamilo LMS 1.11.8 contiene una inyección SQL en main/inc/lib/CoursesAndSessionsCatalog.class.php, lo que permite que usuarios con acceso al catálogo de sesiones (que podría hacerse público de forma opcional) extraigan y/o modifiquen la información de la base de datos. • https://github.com/chamilo/chamilo-lms/commit/bfa1eccfabb457b800618d9d115f12dc614a55df • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 1%CPEs: 20EXPL: 0

23 Jul 2018 — Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62. Chamilo LMS en versiones 11.x contiene una vulnerabilidad de deserialización en el parámetro GET "hash" para el endp... • https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 10EXPL: 4

27 Nov 2013 — SQL injection vulnerability in the check_user_password function in main/auth/profile.php in Chamilo LMS 1.9.6 and earlier, when using the non-encrypted passwords mode set at installation, allows remote authenticated users to execute arbitrary SQL commands via the "password0" parameter. Vulnerabilidad de inyección SQL en la función check_user_password en main/auth/profile.php en Chamilo LMS 1.9.6 y anteriores, cuando se utiliza el modo de contraseñas no cifradas durante la instalación, permite a usuarios aut... • https://www.exploit-db.com/exploits/30012 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Aug 2012 — Chamilo before 1.8.8.6 does not adequately handle user supplied input by the index.php script, which could allow remote attackers to delete arbitrary files. Chamilo versiones anteriores a la versión 1.8.8.6, no maneja adecuadamente la información suministrada por el usuario mediante el script del archivo index.php, lo que podría permitir a atacantes remotos eliminar archivos arbitrarios. Chamilo version 1.8.8.4 suffers from cross site scripting and file deletion vulnerabilities. • https://exchange.xforce.ibmcloud.com/vulnerabilities/78054 • CWE-20: Improper Input Validation •