Page 17 of 89 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar. GLPI anterior a 0.84.7 no restringe correctamente el acceso a la información de costes, lo que permite a atacantes remotos obtener información sensible a través del criterio de costes en la barra de búsqueda. • http://advisories.mageia.org/MGASA-2015-0017.html http://www.glpi-project.org/spip.php?page=annonce&id_breve=325 http://www.mandriva.com/security/advisories?name=MDVSA-2015:167 https://forge.indepnet.net/issues/4984 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 3

SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter. Vulnerabilidad de inyección SQL en ajax/getDropdownValue.php en GLPI anterior a 0.85.1 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro condition. • https://www.exploit-db.com/exploits/35528 http://advisories.mageia.org/MGASA-2015-0017.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147271.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147296.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147313.html http://osvdb.org/show/osvdb/115957 http://secunia.com/advisories/61367 http://security.szurek.pl/glpi-085-blind-sql-injection.html http://www.exploit-db.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 3

Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php. Múltiples vulnerabilidades de inyección SQL en GLPI anterior a 0.83.9 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro (1) users_id_assign en ajax/ticketassigninformation.php, (2) filename en front/document.form.php o (3) table en ajax/comments.php. • https://www.exploit-db.com/exploits/26366 http://www.glpi-project.org/spip.php?page=annonce&id_breve=297&lang=en&debut_autres_breves= http://www.securityfocus.com/bid/60693 http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5146.php • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 25%CPEs: 79EXPL: 3

inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action. inc/central.class.php en GLPI anteriores a 0.84.2 no intenta inhabilitar install/install.php después de una instalación completa, lo cual permite a atacantes remotos efectuar ataques cross-site request forgery (CSRF), y (1) ejecutar inyecciones SQL a través de una acción Etape_4 o (2) ejecutar código PHP arbitrario a través de una acción update_1. GLPI version 0.84.1 suffers from improper access control bypass and PHP code injection vulnerabilities. • https://www.exploit-db.com/exploits/28483 https://www.exploit-db.com/exploits/28685 http://www.glpi-project.org/spip.php?page=annonce&id_breve=308 https://forge.indepnet.net/issues/4480 https://forge.indepnet.net/projects/glpi/repository/revisions/21753 https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.4EPSS: 16%CPEs: 76EXPL: 3

inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php. inc/ticket.class.php en GLPI 0.83.9 y anteriores permite a atacantes remotos deserializar objetos PHP arbitrarios a través del parámetro _predefined_fields hacia front/ticket.form.php. GLPI version 0.83.9 suffers from a remote PHP code execution vulnerability in the unserialize() function. • https://www.exploit-db.com/exploits/26530 http://osvdb.org/94683 http://seclists.org/oss-sec/2013/q2/626 http://seclists.org/oss-sec/2013/q2/645 http://www.exploit-db.com/exploits/26530 http://www.securityfocus.com/bid/60823 https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff •