Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Command injection in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-3368.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-3545 | 9.8 CRITICAL | Chamilo LMS Htaccess File Upload Security Bypass |
| CVE-2023-3533 | 9.8 CRITICAL | Chamilo LMS Unauthenticated Remote Code Execution via Arbitrary File Write |
| CVE-2023-4225 | 8.8 HIGH | Chamilo LMS File Upload Functionality Remote Code Execution |
| CVE-2023-4226 | 8.8 HIGH | Chamilo LMS File Upload Functionality Remote Code Execution |
| CVE-2023-4224 | 8.8 HIGH | Chamilo LMS File Upload Functionality Remote Code Execution |
| CVE-2023-4223 | 8.8 HIGH | Chamilo LMS File Upload Functionality Remote Code Execution |
| CVE-2023-4220 | 8.1 HIGH | Chamilo LMS Unauthenticated Big Upload File Remote Code Execution |
| CVE-2023-4222 | 7.2 HIGH | Chamilo LMS Learning Path PPT2LP Command Injection Vulnerability |
| CVE-2023-4221 | 7.2 HIGH | Chamilo LMS Learning Path PPT2LP Command Injection Vulnerability |
No comments yet