Glpi-Project Glpi vulnerabilities

193 known vulnerabilities affecting glpi-project/glpi.

Total CVEs
193
CISA KEV
1
actively exploited
Public exploits
15
Exploited in wild
1
Severity breakdown
CRITICAL27HIGH53MEDIUM111LOW2

Vulnerabilities

Page 10 of 10
CVE-2016-7508HIGHCVSS 7.5PoCv0.90.42017-06-21
CVE-2016-7508 [HIGH] CWE-89 CVE-2016-7508: Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to exec Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding.
nvd
CVE-2015-7684CRITICALCVSS 9.0≤ 0.85.22015-10-05
CVE-2015-7684 [CRITICAL] CVE-2015-7684: Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrar Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/.
nvd
CVE-2015-7685MEDIUMCVSS 4.0≤ 0.85.22015-10-05
CVE-2015-7685 [MEDIUM] CWE-264 CVE-2015-7685: GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging pe GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php.
nvd
CVE-2014-8360HIGHCVSS 7.5≤ 0.84.72015-04-14
CVE-2014-8360 [HIGH] CWE-22 CVE-2014-8360: Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote a Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php.
nvdosv
CVE-2014-5032MEDIUMCVSS 5.0≤ 0.84.62015-04-14
CVE-2014-5032 [MEDIUM] CWE-264 CVE-2014-5032: GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attack GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar.
nvdosv
CVE-2014-9258MEDIUMCVSS 6.5PoC≤ 0.852014-12-19
CVE-2014-9258 [MEDIUM] CWE-89 CVE-2014-9258: SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authent SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.
nvd
CVE-2013-2225MEDIUMCVSS 6.4PoC≤ 0.83.9v0.5+55 more2014-05-27
CVE-2013-2225 [MEDIUM] CVE-2013-2225: inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php.
nvdosv
CVE-2013-2226HIGHCVSS 7.5PoC≤ 0.83.8v0.83+8 more2014-05-14
CVE-2013-2226 [HIGH] CWE-89 CVE-2013-2226: Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbit Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.
nvdosv
CVE-2013-5696MEDIUMCVSS 6.8PoC≤ 0.84.1v0.5+58 more2013-09-23
CVE-2013-5696 [MEDIUM] CWE-352 CVE-2013-5696: inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action.
nvdosv
CVE-2012-4002MEDIUMCVSS 6.8≤ 0.83.2v0.5+47 more2012-10-09
CVE-2012-4002 [MEDIUM] CWE-352 CVE-2012-4002: Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote att Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
nvd
CVE-2012-4003MEDIUMCVSS 4.3≤ 0.83.2v0.5+47 more2012-10-09
CVE-2012-4003 [MEDIUM] CWE-79 CVE-2012-4003: Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJECT GLPI before 0.83.3 allow remote Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJECT GLPI before 0.83.3 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.
nvd
CVE-2012-1037MEDIUMCVSS 6.5v0.78v0.78.1+12 more2012-07-12
CVE-2012-1037 [MEDIUM] CWE-94 CVE-2012-1037: PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remot PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter.
nvd
CVE-2011-2720MEDIUMCVSS 5.0≤ 0.80.1v0.5+31 more2011-08-05
CVE-2011-2720 [MEDIUM] CWE-200 CVE-2011-2720: The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and passw The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.
nvd