Glpi-project

Glpi

184 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 17.07.2017 13:18:20
  • Zuletzt bearbeitet 20.04.2025 01:37:25

GLPI before 9.1.5 allows SQL injection via an ajax/getDropdownValue.php request with an entity_restrict parameter that is not a list of integers.

  • EPSS 0.42%
  • Veröffentlicht 21.06.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding.

  • EPSS 0.15%
  • Veröffentlicht 05.10.2015 14:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php.

  • EPSS 1.22%
  • Veröffentlicht 05.10.2015 14:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tm...

  • EPSS 0.98%
  • Veröffentlicht 14.04.2015 18:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the...

  • EPSS 0.39%
  • Veröffentlicht 14.04.2015 18:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar.

Exploit
  • EPSS 6.93%
  • Veröffentlicht 19.12.2014 15:59:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.

Exploit
  • EPSS 12.35%
  • Veröffentlicht 27.05.2014 14:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php.

Exploit
  • EPSS 2.59%
  • Veröffentlicht 14.05.2014 19:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3)...

Exploit
  • EPSS 63.95%
  • Veröffentlicht 23.09.2013 03:49:27
  • Zuletzt bearbeitet 11.04.2025 00:51:21

inc/central.class.php in GLPI before 0.84.2 does not attempt to make install/install.php unavailable after an installation is completed, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and (1) perform a SQL injecti...