Filtered by vendor Glpi-project
Subscribe
Total
118 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-40638 | 1 Glpi-project | 1 Glpi | 2024-11-20 | N/A | 8.8 HIGH |
GLPI is a free asset and IT management software package. An authenticated user can exploit multiple SQL injection vulnerabilities. One of them can be used to alter another user account data and take control of it. Upgrade to 10.0.17. | |||||
CVE-2024-41678 | 1 Glpi-project | 1 Glpi | 2024-11-20 | N/A | 6.1 MEDIUM |
GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17. | |||||
CVE-2024-41679 | 1 Glpi-project | 1 Glpi | 2024-11-20 | N/A | 8.8 HIGH |
GLPI is a free asset and IT management software package. An authenticated user can exploit a SQL injection vulnerability from the ticket form. Upgrade to 10.0.17. | |||||
CVE-2024-43417 | 1 Glpi-project | 1 Glpi | 2024-11-20 | N/A | 6.1 MEDIUM |
GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the Software form. Upgrade to 10.0.17. | |||||
CVE-2024-43418 | 1 Glpi-project | 1 Glpi | 2024-11-20 | N/A | 6.1 MEDIUM |
GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17. | |||||
CVE-2024-45608 | 1 Glpi-project | 1 Glpi | 2024-11-20 | N/A | 8.8 HIGH |
GLPI is a free asset and IT management software package. An authenticated user can perfom a SQL injection by changing its preferences. Upgrade to 10.0.17. | |||||
CVE-2024-45609 | 1 Glpi-project | 1 Glpi | 2024-11-19 | N/A | 6.1 MEDIUM |
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the reports pages. Upgrade to 10.0.17. | |||||
CVE-2024-45610 | 1 Glpi-project | 1 Glpi | 2024-11-19 | N/A | 6.1 MEDIUM |
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the Cable form. Upgrade to 10.0.17. | |||||
CVE-2024-45611 | 1 Glpi-project | 1 Glpi | 2024-11-19 | N/A | 5.4 MEDIUM |
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can bypass the access control policy to create a private RSS feed attached to another user account and use a malicious payload to triggger a stored XSS. Upgrade to 10.0.17. | |||||
CVE-2023-51446 | 1 Glpi-project | 1 Glpi | 2024-02-07 | N/A | 8.1 HIGH |
GLPI is a Free Asset and IT Management Software package. When authentication is made against a LDAP, the authentication form can be used to perform LDAP injection. Upgrade to 10.0.12. | |||||
CVE-2024-23645 | 1 Glpi-project | 1 Glpi | 2024-02-07 | N/A | 6.1 MEDIUM |
GLPI is a Free Asset and IT Management Software package. A malicious URL can be used to execute XSS on reports pages. Upgrade to 10.0.12. | |||||
CVE-2023-46726 | 1 Glpi-project | 1 Glpi | 2024-02-05 | N/A | 9.8 CRITICAL |
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, on PHP 7.4 only, the LDAP server configuration form can be used to execute arbitrary code previously uploaded as a GLPI document. Version 10.0.11 contains a patch for the issue. | |||||
CVE-2023-43813 | 1 Glpi-project | 1 Glpi | 2024-02-05 | N/A | 8.8 HIGH |
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, the saved search feature can be used to perform a SQL injection. Version 10.0.11 contains a patch for the issue. | |||||
CVE-2023-46727 | 1 Glpi-project | 1 Glpi | 2024-02-05 | N/A | 9.8 CRITICAL |
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, GLPI inventory endpoint can be used to drive a SQL injection attack. Version 10.0.11 contains a patch for the issue. As a workaround, disable native inventory. | |||||
CVE-2023-37278 | 1 Glpi-project | 1 Glpi | 2024-02-05 | N/A | 9.1 CRITICAL |
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An administrator can trigger SQL injection via dashboards administration. This vulnerability has been patched in version 10.0.9. | |||||
CVE-2023-34106 | 1 Glpi-project | 1 Glpi | 2024-02-04 | N/A | 6.5 MEDIUM |
GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch. | |||||
CVE-2023-34107 | 1 Glpi-project | 1 Glpi | 2024-02-04 | N/A | 6.5 MEDIUM |
GLPI is a free asset and IT management software package. Versions of the software starting with 9.2.0 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user, allows access to the view all KnowbaseItems. Version 10.0.8 has a patch for this issue. | |||||
CVE-2022-34125 | 1 Glpi-project | 1 Cmdb | 2024-02-04 | N/A | 6.5 MEDIUM |
front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter. | |||||
CVE-2023-34254 | 1 Glpi-project | 1 Glpi Agent | 2024-02-04 | N/A | 7.2 HIGH |
The GLPI Agent is a generic management agent. Prior to version 1.5, if glpi-agent is running remoteinventory task against an Unix platform with ssh command, an administrator user on the remote can manage to inject a command in a specific workflow the agent would run with the privileges it uses. In the case, the agent is running with administration privileges, a malicious user could gain high privileges on the computer glpi-agent is running on. A malicious user could also disclose all remote accesses the agent is configured with for remoteinventory task. This vulnerability has been patched in glpi-agent 1.5. | |||||
CVE-2023-35924 | 1 Glpi-project | 1 Glpi | 2024-02-04 | N/A | 9.8 CRITICAL |
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.8, GLPI inventory endpoint can be used to drive a SQL injection attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory. |