Page 17 of 82 results (0.008 seconds)

CVSS: 6.8EPSS: 25%CPEs: 79EXPL: 3

inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action. inc/central.class.php en GLPI anteriores a 0.84.2 no intenta inhabilitar install/install.php después de una instalación completa, lo cual permite a atacantes remotos efectuar ataques cross-site request forgery (CSRF), y (1) ejecutar inyecciones SQL a través de una acción Etape_4 o (2) ejecutar código PHP arbitrario a través de una acción update_1. GLPI version 0.84.1 suffers from improper access control bypass and PHP code injection vulnerabilities. • https://www.exploit-db.com/exploits/28483 https://www.exploit-db.com/exploits/28685 http://www.glpi-project.org/spip.php?page=annonce&id_breve=308 https://forge.indepnet.net/issues/4480 https://forge.indepnet.net/projects/glpi/repository/revisions/21753 https://forge.indepnet.net/projects/glpi/repository/revisions/21753/diff/branches/0.84-bugfixes/inc/central.class.php https://www.navixia.com/blog/entry/navixia-finds-critical-vulnerabilities-in-glpi-cve-2013-5696.html • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.4EPSS: 16%CPEs: 76EXPL: 3

inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php. inc/ticket.class.php en GLPI 0.83.9 y anteriores permite a atacantes remotos deserializar objetos PHP arbitrarios a través del parámetro _predefined_fields hacia front/ticket.form.php. GLPI version 0.83.9 suffers from a remote PHP code execution vulnerability in the unserialize() function. • https://www.exploit-db.com/exploits/26530 http://osvdb.org/94683 http://seclists.org/oss-sec/2013/q2/626 http://seclists.org/oss-sec/2013/q2/645 http://www.exploit-db.com/exploits/26530 http://www.securityfocus.com/bid/60823 https://forge.indepnet.net/projects/glpi/repository/revisions/21169/diff •