"value":"Multiple SQL injection vulnerabilities in Open Source Security Information Management (OSSIM) before 2.1.2 allow remote authenticated users to execute arbitrary SQL commands via the id_document parameter to (1) repository_document.php, (2) repository_links.php, and (3) repository_editdocument.php in repository/; the (4) group parameter to policy/getpolicy.php; the name parameter to (5) host/newhostgroupform.php and (6) net/modifynetform.php; and unspecified other vectors related to the policy menu."
},
{
"lang":"es",
"value":"Multiples vulnerabilidades de inyecci\u00f3n SQL en Open Source Security Information Management (OSSIM) en versiones anteriores a la v2.1.2 permiten a usuarios remotos autenticados ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de el par\u00e1metro \"id_document\" a (1) repository_document.php, (2) repository_links.php, y (3) repository_editdocument.php de repository/; el (4) par\u00e1metro \"group\" (grupo) a policy/getpolicy.php; el par\u00e1metro \"name\" (nombre) a (5) host/newhostgroupform.php y (6) net/modifynetform.php; y a trav\u00e9s de otros vectores de ataque sin especificar relacionados con el menu \"policy\" (pol\u00edticas)."