GLPI Multiple SQL Injection Vulnerabilities

Attackers can use a browser to exploit these issues.

The following example data is available:


 

Privacy Statement
Copyright 2010, SecurityFocus