Vulnerabilities > Glpi Project > Glpi
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-25 | CVE-2020-26212 | Unspecified vulnerability in Glpi-Project Glpi GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. | 6.5 |
2020-10-07 | CVE-2020-15226 | Unspecified vulnerability in Glpi-Project Glpi In GLPI before version 9.5.2, there is a SQL Injection in the API's search function. | 4.3 |
2020-10-07 | CVE-2020-15217 | Unspecified vulnerability in Glpi-Project Glpi 9.5.0/9.5.1 In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. | 5.3 |
2020-10-07 | CVE-2020-15177 | Unspecified vulnerability in Glpi-Project Glpi In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. | 6.1 |
2020-10-07 | CVE-2020-15176 | Unspecified vulnerability in Glpi-Project Glpi In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. | 8.6 |
2020-10-07 | CVE-2020-15175 | Unspecified vulnerability in Glpi-Project Glpi In GLPI before version 9.5.2, the `?pluginimage.send.php?` endpoint allows a user to specify an image from a plugin. | 9.1 |
2020-09-23 | CVE-2020-11031 | Unspecified vulnerability in Glpi-Project Glpi In GLPI before version 9.5.0, the encryption algorithm used is insecure. | 7.5 |
2020-07-17 | CVE-2020-15108 | SQL Injection vulnerability in Glpi-Project Glpi In glpi before 9.5.1, there is a SQL injection for all usages of "Clone" feature. | 7.1 |
2020-05-12 | CVE-2020-11062 | Cross-site Scripting vulnerability in Glpi-Project Glpi In GLPI after 0.68.1 and before 9.4.6, multiple reflexive XSS occur in Dropdown endpoints due to an invalid Content-Type. | 5.4 |
2020-05-12 | CVE-2020-11060 | Cross-Site Request Forgery (CSRF) vulnerability in Glpi-Project Glpi In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. | 8.8 |