Page 12 of 60 results (0.024 seconds)

CVSS: 6.8EPSS: 25%CPEs: 79EXPL: 3

inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action. inc/central.class.php en GLPI anteriores a 0.84.2 no intenta inhabilitar install/install.php después de una instalación completa, lo cual permite a atacantes remotos efectuar ataques cross-site request forgery (CSRF), y (1) ejecutar inyecciones SQL a través de una acción Etape_4 o (2) ejecutar código PHP arbitrario a través de una acción update_1. GLPI version 0.84.1 suffers from improper access control bypass and PHP code injection vulnerabilities. • https://www.exploit-db.com/exploits/28483 https://www.exploit-db.com/exploits/28685 http://www.glpi-project.org/spip.php?page=annonce&id_breve=308 https://forge.indepnet.net/issues/4480 https://forge.indepnet.net/projects/glpi/repository/revisions/21753 https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.4EPSS: 16%CPEs: 76EXPL: 3

inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php. inc/ticket.class.php en GLPI 0.83.9 y anteriores permite a atacantes remotos deserializar objetos PHP arbitrarios a través del parámetro _predefined_fields hacia front/ticket.form.php. GLPI version 0.83.9 suffers from a remote PHP code execution vulnerability in the unserialize() function. • https://www.exploit-db.com/exploits/26530 http://osvdb.org/94683 http://seclists.org/oss-sec/2013/q2/626 http://seclists.org/oss-sec/2013/q2/645 http://www.exploit-db.com/exploits/26530 http://www.securityfocus.com/bid/60823 https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff •

CVSS: 4.3EPSS: 0%CPEs: 68EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJECT GLPI before 0.83.3 allow remote attackers to inject arbitrary web script or HTML via unknown vectors. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en GLPI-PROJECT GLPI antes de v0.83.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores desconocidos. • http://www.mandriva.com/security/advisories?name=MDVSA-2012:132 http://www.openwall.com/lists/oss-security/2012/07/13/1 https://forge.indepnet.net/issues/3705 https://forge.indepnet.net/projects/glpi/versions/771 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 68EXPL: 0

Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. Una vulnerabilidad de falsificación de peticiones en sitios cruzados (CSRF). en GLPI-PROJECT GLPI antes de v0.83.3 permite a atacantes remotos secuestrar la autenticación de las víctimas a través de vectores desconocidos. • http://www.mandriva.com/security/advisories?name=MDVSA-2012:132 http://www.openwall.com/lists/oss-security/2012/07/13/1 https://forge.indepnet.net/issues/3704 https://forge.indepnet.net/issues/3707 https://forge.indepnet.net/projects/glpi/versions/771 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 0%CPEs: 52EXPL: 0

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request. La funcionalidad de autocompletado en GLPI en versiones anteriores a la 0.80.2 no excluye campos determinados de nombres de usuario y contraseñas, lo que permite a atacantes remotos obtener información confidencial a través de determinadas peticiones POST. • http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html http://secunia.com/advisories/45366 http://secunia.com/advisories/45542 http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en http://www.mandriva.com/security/advisories?name=MDVSA-2012:014 http://www.openwall.com/lists/oss-security/2011/07/25/7 http://www.openwall.com/lists/oss-security/2011/07/26/11&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •