Vulnerabilities > Combodo > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-01-12 | CVE-2020-4079 | Unspecified vulnerability in Combodo Itop Combodo iTop is a web based IT Service Management tool. | 7.7 |
2020-08-10 | CVE-2020-12781 | Cross-Site Request Forgery (CSRF) vulnerability in Combodo Itop Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery. | 8.8 |
2020-08-10 | CVE-2020-12780 | Incorrect Authorization vulnerability in Combodo Itop A security misconfiguration exists in Combodo iTop, which can expose sensitive information. | 7.5 |
2020-08-10 | CVE-2020-12777 | Information Exposure vulnerability in Combodo Itop A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information. | 7.5 |
2020-03-16 | CVE-2019-19821 | Cross-site Scripting vulnerability in Combodo Itop A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses. | 8.1 |
2020-02-14 | CVE-2019-13967 | Unspecified vulnerability in Combodo Itop iTop 2.2.0 through 2.6.0 allows remote attackers to cause a denial of service (application outage) via many requests to launch a compile operation. | 7.5 |
2020-02-14 | CVE-2019-11215 | Incorrect Permission Assignment for Critical Resource vulnerability in Combodo Itop In Combodo iTop 2.2.0 through 2.6.0, if the configuration file is writable, then execution of arbitrary code can be accomplished by calling ajax.dataloader with a maliciously crafted payload. | 8.1 |
2019-04-04 | CVE-2019-10863 | Code Injection vulnerability in Combodo Teemip A command injection vulnerability exists in TeemIp versions before 2.4.0. | 7.2 |
2018-05-02 | CVE-2018-10642 | Code Injection vulnerability in Combodo Itop Command injection vulnerability in Combodo iTop 2.4.1 allows remote authenticated administrators to execute arbitrary commands by changing the platform configuration, because web/env-production/itop-config/config.php contains a function called TestConfig() that calls the vulnerable function eval(). | 7.2 |