Page 5 of 78 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Deleted/deactivated user could continue to use their account as long as its cookie is valid. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-pgcx-mc58-3gmg • CWE-613: Insufficient Session Expiration •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Connected users may gain access to debug panel through the GLPI update script. This issue has been patched, please upgrade to 10.0.4. As a workaround, delete the `install/update.php` script. • https://github.com/glpi-project/glpi/security/advisories/GHSA-6c2p-wgx9-vrjc • CWE-284: Improper Access Control •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. External links are not properly sanitized and can therefore be used for a Cross-Site Scripting (XSS) attack. This issue has been patched, please upgrade to GLPI 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-rhcw-8r7g-8pwc https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-5rj7-95qc-89h2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 9.8EPSS: 97%CPEs: 1EXPL: 9

/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection. El archivo /vendor/htmlawed/htmlawed/htmLawedTest.php en el módulo htmlawed para GLPI versiones hasta 10.0.2, permite una inyección de código PHP Teclib GLPI contains a remote code execution vulnerability in the third-party library, htmlawed. • https://www.exploit-db.com/exploits/52023 https://github.com/cosad3s/CVE-2022-35914-poc https://github.com/Lzer0Kx01/CVE-2022-35914 https://github.com/allendemoura/CVE-2022-35914 https://github.com/0romos/CVE-2022-35914 https://github.com/0xGabe/CVE-2022-35914 https://github.com/Johnermac/CVE-2022-35914 https://github.com/6E6L6F/CVE-2022-35914 http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html http://www.bioinformatics.org/phplabware/sourceer/sou • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •