Vulnerabilities > Glpi Project
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-07-17 | CVE-2017-11329 | SQL Injection vulnerability in Glpi-Project Glpi GLPI before 9.1.5 allows SQL injection via an ajax/getDropdownValue.php request with an entity_restrict parameter that is not a list of integers. | 7.5 |
2017-06-21 | CVE-2016-7508 | SQL Injection vulnerability in Glpi-Project Glpi 0.90.4 Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding. | 6.0 |
2015-10-05 | CVE-2015-7685 | Permissions, Privileges, and Access Controls vulnerability in Glpi-Project Glpi GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php. | 4.0 |
2015-10-05 | CVE-2015-7684 | Unspecified vulnerability in Glpi-Project Glpi Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/. | 9.0 |
2015-04-14 | CVE-2014-8360 | Path Traversal vulnerability in Glpi-Project Glpi Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php. | 7.5 |
2015-04-14 | CVE-2014-5032 | Permissions, Privileges, and Access Controls vulnerability in Glpi-Project Glpi GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar. | 5.0 |
2014-12-19 | CVE-2014-9258 | SQL Injection vulnerability in Glpi-Project Glpi SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter. | 6.5 |
2014-05-27 | CVE-2013-2225 | Remote PHP Code Execution vulnerability in GLPI 'unserialize()' Function inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php. | 6.4 |
2014-05-14 | CVE-2013-2226 | SQL Injection vulnerability in Glpi-Project Glpi Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php. | 7.5 |
2013-09-23 | CVE-2013-5696 | Cross-Site Request Forgery (CSRF) vulnerability in Glpi-Project Glpi inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action. | 6.8 |