漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the (1) query string to (a) announcements/messages.php; (b) lostPassword.php and (c) profile.php in auth/; (d) calendar/myagenda.php; (e) group/group.php; (f) learningPath.php, (g) learningPathList.php, and (h) module.php in learnPath/; (i) phpbb/index.php; (j) courseLog.php, (k) course_access_details.php, (l) delete_course_stats.php, (m) userLog.php, and (n) user_access_details.php in tracking/; (o) user/user.php; and (p) user/userInfo.php; the (2) view parameter to (q) tracking/courseLog.php; and the (3) toolId parameter to (r) tracking/toolaccess_details.php. NOTE: this may overlap CVE-2006-3257 and CVE-2005-1374.
漏洞信息
N/A
漏洞
N/A
漏洞
Claroline Prior to 1.8.11 多个跨站脚本漏洞
漏洞信息
Claroline是一套适用于传统教育培训的教学辅助平台。 Claroline 1.8.10版本存在多个跨站脚本漏洞。远程攻击者可以借助 t(a)announcements/messages.php;auth/中的(b)lostPassword.php和(c)profile.php;(d)calendar/myagenda.php;(e)group/group.php;learnPath/中的(f)learningPath.php,(g)learningPathList.php,和(h)module.ph
漏洞信息
N/A
漏洞
N/A