Claroline e-Learning versions 1.6 and below remote password hash extraction SQL injection exploit.
d4d28dad2ed1e2611a7cbb64a0a9e56b1021a8cf906461880bc67ae1541ae9df
Claroline versions 1.7.4 and below scormExport.inc.php remote command execution exploit.
55a177b70aca738c26ac780686ce670138ad5a586047192adb51c3b823f4ef1f
Claroline 1.6.1 is vulnerable to multiple directory traversal attacks. Teacher access is needed for successful exploitation.
e9fd260847e06c5f1d63952a7a8de9fb08e7390eaf4354a23a12b802ed02846a
Multiple Cross site scripting, 10 SQL injection, 7 directory traversal and 4 remote file inclusion vulnerabilities have been found in Claroline versions 1.6 and below.
052e9365cb9d1fd65a53162363bd9fa05dd0a5aa01b916faa3eafffc8e316c8a
Perl version of the Claroline e-Learning version 1.6 and below remote password hash extraction SQL injection exploit.
d611e1b2a90b10c2fd6329c2964130b5cfc4dca52477b13ec7e64443e116a313