Added CPE Configuration
OR
     *cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:* versions from (including) 1.11.0 up to (including) 1.11.16
Added CVSS V2
NIST (AV:N/AC:M/Au:S/C:P/I:P/A:P)
Added CVSS V3.1
NIST AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE
NIST CWE-94
Changed Reference Type
https://github.com/andrejspuler/writeups/tree/main/chamilo-lms#authenticated-remote-code-execution-in-import-file No Types Assigned
https://github.com/andrejspuler/writeups/tree/main/chamilo-lms#authenticated-remote-code-execution-in-import-file Exploit, Patch, Third Party Advisory
Changed Reference Type
https://github.com/chamilo/chamilo-lms/commit/2e5c004b57d551678a1815500ef91524ba7bb757 No Types Assigned
https://github.com/chamilo/chamilo-lms/commit/2e5c004b57d551678a1815500ef91524ba7bb757 Patch, Third Party Advisory
Changed Reference Type
https://github.com/chamilo/chamilo-lms/commit/905a21037ebc9bc5369f0fb380177cb56f496f5c No Types Assigned
https://github.com/chamilo/chamilo-lms/commit/905a21037ebc9bc5369f0fb380177cb56f496f5c Patch, Third Party Advisory
Changed Reference Type
https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-66-2021-05-21-High-impact-very-low-risk-Authenticated-RCE-in-accessory-script No Types Assigned
https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-66-2021-05-21-High-impact-very-low-risk-Authenticated-RCE-in-accessory-script Patch, Vendor Advisory