Page 4 of 74 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. • https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Deleted/deactivated user could continue to use their account as long as its cookie is valid. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-pgcx-mc58-3gmg • CWE-613: Insufficient Session Expiration •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. External links are not properly sanitized and can therefore be used for a Cross-Site Scripting (XSS) attack. This issue has been patched, please upgrade to GLPI 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-rhcw-8r7g-8pwc https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 9.8EPSS: 97%CPEs: 1EXPL: 9

/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection. El archivo /vendor/htmlawed/htmlawed/htmLawedTest.php en el módulo htmlawed para GLPI versiones hasta 10.0.2, permite una inyección de código PHP Teclib GLPI contains a remote code execution vulnerability in the third-party library, htmlawed. • https://www.exploit-db.com/exploits/52023 https://github.com/cosad3s/CVE-2022-35914-poc https://github.com/Lzer0Kx01/CVE-2022-35914 https://github.com/allendemoura/CVE-2022-35914 https://github.com/0romos/CVE-2022-35914 https://github.com/0xGabe/CVE-2022-35914 https://github.com/Johnermac/CVE-2022-35914 https://github.com/6E6L6F/CVE-2022-35914 http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html http://www.bioinformatics.org/phplabware/sourceer/sou • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions were found to not properly neutralize HTML tags in the global search context. Users are advised to upgrade to version 10.0.3 to resolve this issue. Users unable to upgrade should disable global search. GLPI son las siglas de Gestionnaire Libre de Parc Informatique y es un Paquete de Software Libre de Administración de Activos y TI, que proporciona funciones de Service Desk de ITIL, seguimiento de licencias y auditoría de software. • https://github.com/glpi-project/glpi/commit/e248ed5649d267c0f61a17d99b7bd6be4074aadb https://github.com/glpi-project/glpi/security/advisories/GHSA-43j5-xhvj-9236 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •