Vulnerabilities > Glpi Project > Glpi > 0.84.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-04-14 | CVE-2014-5032 | Permissions, Privileges, and Access Controls vulnerability in Glpi-Project Glpi GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar. | 5.0 |
2014-12-19 | CVE-2014-9258 | SQL Injection vulnerability in Glpi-Project Glpi SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter. | 6.5 |
2013-09-23 | CVE-2013-5696 | Cross-Site Request Forgery (CSRF) vulnerability in Glpi-Project Glpi inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action. | 6.8 |