Total
166 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-2226 | 1 Glpi-project | 1 Glpi | 2014-05-15 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php. | |||||
CVE-2013-5696 | 1 Glpi-project | 1 Glpi | 2013-09-23 | 6.8 MEDIUM | N/A |
inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injection via an Etape_4 action or (2) execute arbitrary PHP code via an update_1 action. | |||||
CVE-2012-4003 | 1 Glpi-project | 1 Glpi | 2013-04-11 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJECT GLPI before 0.83.3 allow remote attackers to inject arbitrary web script or HTML via unknown vectors. | |||||
CVE-2012-4002 | 1 Glpi-project | 1 Glpi | 2013-04-11 | 6.8 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI before 0.83.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | |||||
CVE-2012-1037 | 1 Glpi-project | 1 Glpi | 2012-07-16 | 6.5 MEDIUM | N/A |
PHP remote file inclusion vulnerability in front/popup.php in GLPI 0.78 through 0.80.61 allows remote authenticated users to execute arbitrary PHP code via a URL in the sub_type parameter. | |||||
CVE-2011-2720 | 1 Glpi-project | 1 Glpi | 2012-02-16 | 5.0 MEDIUM | N/A |
The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request. |