Page 17 of 149 results (0.004 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade. GLPI es un paquete de software gratuito de administración de activos y TI, que proporciona funciones de Service Desk de ITIL, seguimiento de licencias y auditoría de software. • https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20 https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e https://github.com/glpi-project/glpi/releases/tag/10.0.0 https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars. • https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue. • https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A SQL Injection vulnerability exits in the Ramo plugin for GLPI 9.4.6 via the idu parameter in plugins/ramo/ramoapirest.php/getOutdated. Se presenta una vulnerabilidad de inyección SQL en el plugin de Ramo para GLPI versión 9.4.6, por medio del parámetro idu en el archivo plugins/ramo/ramoapirest.php/getOutdated Baixar GLPI Project 9.4.6 suffers from a remote SQL injection vulnerability. • http://packetstormsecurity.com/files/166285/Baixar-GLPI-Project-9.4.6-SQL-Injection.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability. GLPI es un paquete de software gratuito de administración de activos y TI. versiones anteriores a 9.5.7, un administrador de entidades es capaz de recuperar datos normalmente inaccesibles por medio de una inyección SQL. • https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326 https://github.com/glpi-project/glpi/releases/tag/9.5.7 https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •