Page 31 of 152 results (0.018 seconds)

CVSS: 6.5EPSS: 0%CPEs: 14EXPL: 0

PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter. Una vulnerabilidad de inclusión remota de fichero PHP en front/popup.php en GLPI v0.78 a v0.80.61 permite ejecutar código PHP de su elección a usuarios remotos autenticados a través de una URL en el parámetro sub_type. GLPI versions 0.80.61 and below suffer from local file inclusion and remote file inclusion vulnerabilities. • http://seclists.org/fulldisclosure/2012/Feb/157 http://www.mandriva.com/security/advisories?name=MDVSA-2012:016 https://forge.indepnet.net/issues/3338 https://forge.indepnet.net/projects/glpi/repository/revisions/17457/diff/branches/0.80-bugfixes/front/popup.php https://forge.indepnet.net/projects/glpi/versions/685 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.0EPSS: 0%CPEs: 52EXPL: 0

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request. La funcionalidad de autocompletado en GLPI en versiones anteriores a la 0.80.2 no excluye campos determinados de nombres de usuario y contraseñas, lo que permite a atacantes remotos obtener información confidencial a través de determinadas peticiones POST. • http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html http://secunia.com/advisories/45366 http://secunia.com/advisories/45542 http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en http://www.mandriva.com/security/advisories?name=MDVSA-2012:014 http://www.openwall.com/lists/oss-security/2011/07/25/7 http://www.openwall.com/lists/oss-security/2011/07/26/11&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •