Page 12 of 129 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Time based attack using a SQL injection in api REST user_token. This issue has been patched, please upgrade to version 10.0.4. As a workaround, disable login with user_token on API Rest. • https://github.com/glpi-project/glpi/security/advisories/GHSA-cp6q-9p4x-8hr9 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Script related HTML tags in assets inventory information are not properly neutralized. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-w7wc-728f-6mm8 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-5rj7-95qc-89h2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to create a public RSS feed to inject malicious code in dashboards of other users. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-fxcx-93fq-8r9g • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 97%CPEs: 1EXPL: 9

/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection. El archivo /vendor/htmlawed/htmlawed/htmLawedTest.php en el módulo htmlawed para GLPI versiones hasta 10.0.2, permite una inyección de código PHP Teclib GLPI contains a remote code execution vulnerability in the third-party library, htmlawed. • https://www.exploit-db.com/exploits/52023 https://github.com/cosad3s/CVE-2022-35914-poc https://github.com/Lzer0Kx01/CVE-2022-35914 https://github.com/allendemoura/CVE-2022-35914 https://github.com/0romos/CVE-2022-35914 https://github.com/0xGabe/CVE-2022-35914 https://github.com/Johnermac/CVE-2022-35914 https://github.com/6E6L6F/CVE-2022-35914 http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html http://www.bioinformatics.org/phplabware/sourceer/sou • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •