Vulnerabilities > Combodo > High

DATE CVE VULNERABILITY TITLE RISK
2021-01-12 CVE-2020-4079 Unspecified vulnerability in Combodo Itop
Combodo iTop is a web based IT Service Management tool.
network
low complexity
combodo
7.7
2020-08-10 CVE-2020-12781 Cross-Site Request Forgery (CSRF) vulnerability in Combodo Itop
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.
network
low complexity
combodo CWE-352
8.8
2020-08-10 CVE-2020-12780 Incorrect Authorization vulnerability in Combodo Itop
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
network
low complexity
combodo CWE-863
7.5
2020-08-10 CVE-2020-12777 Information Exposure vulnerability in Combodo Itop
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
network
low complexity
combodo CWE-200
7.5
2020-03-16 CVE-2019-19821 Cross-site Scripting vulnerability in Combodo Itop
A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses.
network
low complexity
combodo CWE-79
8.1
2020-02-14 CVE-2019-13967 Unspecified vulnerability in Combodo Itop
iTop 2.2.0 through 2.6.0 allows remote attackers to cause a denial of service (application outage) via many requests to launch a compile operation.
network
low complexity
combodo
7.5
2020-02-14 CVE-2019-11215 Incorrect Permission Assignment for Critical Resource vulnerability in Combodo Itop
In Combodo iTop 2.2.0 through 2.6.0, if the configuration file is writable, then execution of arbitrary code can be accomplished by calling ajax.dataloader with a maliciously crafted payload.
network
high complexity
combodo CWE-732
8.1
2019-04-04 CVE-2019-10863 Code Injection vulnerability in Combodo Teemip
A command injection vulnerability exists in TeemIp versions before 2.4.0.
network
low complexity
combodo CWE-94
7.2
2018-05-02 CVE-2018-10642 Code Injection vulnerability in Combodo Itop
Command injection vulnerability in Combodo iTop 2.4.1 allows remote authenticated administrators to execute arbitrary commands by changing the platform configuration, because web/env-production/itop-config/config.php contains a function called TestConfig() that calls the vulnerable function eval().
network
low complexity
combodo CWE-94
7.2