Vulnerabilities > Efrontlearning > Efront > 3.1.0

DATE CVE VULNERABILITY TITLE RISK
2018-02-05 CVE-2015-4461 Path Traversal vulnerability in Efrontlearning Efront
Absolute path traversal vulnerability in eFront CMS 3.6.15.4 and earlier allows remote Professor users to obtain sensitive information via a full pathname in the other parameter.
network
low complexity
efrontlearning CWE-22
4.0
2017-07-25 CVE-2015-4463 Unrestricted Upload of File with Dangerous Type vulnerability in Efrontlearning Efront
The file_manager component in eFront CMS before 3.6.15.5 allows remote authenticated users to bypass intended file-upload restrictions by appending a crafted parameter to the file URL.
network
low complexity
efrontlearning CWE-434
4.0
2017-07-25 CVE-2015-4462 Unrestricted Upload of File with Dangerous Type vulnerability in Efrontlearning Efront
Absolute path traversal vulnerability in the file_manager component of eFront CMS before 3.6.15.5 allows remote authenticated users to read arbitrary files via a full pathname in the "Upload file from url" field in the file manager for professor.php.
network
low complexity
efrontlearning CWE-434
4.0
2010-05-12 CVE-2010-1918 SQL Injection vulnerability in Efrontlearning Efront
SQL injection vulnerability in ask_chat.php in eFront 3.6.2 and earlier allows remote attackers to execute arbitrary SQL commands via the chatrooms_ID parameter.
network
low complexity
efrontlearning CWE-89
7.5
2009-10-11 CVE-2009-3660 Code Injection vulnerability in Efrontlearning Efront
PHP remote file inclusion vulnerability in libraries/database.php in Efront 3.5.4 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the path parameter.
6.8
2009-08-21 CVE-2008-7026 Permissions, Privileges, and Access Controls vulnerability in Efrontlearning Efront
Unrestricted file upload vulnerability in filesystem3.class.php in eFront 3.5.1 build 2710 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension as an avatar, then accessing it via a direct request to the file in (1) student/avatars/ or (2) professor/avatars/.
6.8