Page 11 of 60 results (0.016 seconds)

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php. GLPI en versiones anteriores a 0.85.3 permite a usuarios remotos autenticados crear cuentas de super-admin mediante el aprovechamiento de permisos para crear un usuario y el parámetro _profiles_id para front/user.form.php. • http://seclists.org/fulldisclosure/2015/Feb/71 http://www.glpi-project.org/spip.php?page=annonce&id_breve=338 https://forge.glpi-project.org/issues/5218 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php. Vulnerabilidad de salto de directorio en inc/autoload.function.php en GLPI anterior a 0.84.8 permite a atacantes remotos incluir y ejecutar ficheros locales arbitrarios a través de un .._ (punto punto guión bajo) en un tipo item en getItemForItemtype, tal y como fue demostrado por el parámetro itemtype en ajax/common.tabs.php. • http://advisories.mageia.org/MGASA-2015-0017.html http://tlk.tuxfamily.org/doku.php?id=writeup:cve-2014-8360-en http://www.glpi-project.org/spip.php?page=annonce&id_breve=330 http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 https://forge.indepnet.net/issues/5101 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar. GLPI anterior a 0.84.7 no restringe correctamente el acceso a la información de costes, lo que permite a atacantes remotos obtener información sensible a través del criterio de costes en la barra de búsqueda. • http://advisories.mageia.org/MGASA-2015-0017.html http://www.glpi-project.org/spip.php?page=annonce&id_breve=325 http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 https://forge.indepnet.net/issues/4984 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 3

SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter. Vulnerabilidad de inyección SQL en ajax/getDropdownValue.php en GLPI anterior a 0.85.1 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro condition. • https://www.exploit-db.com/exploits/35528 http://advisories.mageia.org/MGASA-2015-0017.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html http://osvdb.org/show/osvdb/115957 http://secunia.com/advisories/61367 http://security.szurek.pl/glpi-085-blind-sql-injection.html http://www.exploit-db.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 3

Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php. Múltiples vulnerabilidades de inyección SQL en GLPI anterior a 0.83.9 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro (1) users_id_assign en ajax/ticketassigninformation.php, (2) filename en front/document.form.php o (3) table en ajax/comments.php. • https://www.exploit-db.com/exploits/26366 http://www.glpi-project.org/spip.php?page=annonce&id_breve=297&lang=en&debut_autres_breves= http://www.securityfocus.com/bid/60693 http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •