Vulnerabilities (CVE)

Filtered by vendor Glpi-project Subscribe
Filtered by product Glpi
Total 184 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-11474 1 Glpi-project 1 Glpi 2025-04-20 7.5 HIGH 9.8 CRITICAL
GLPI before 9.1.5.1 has SQL Injection in the $crit variable in inc/computer_softwareversion.class.php, exploitable via ajax/common.tabs.php.
CVE-2016-7507 1 Glpi-project 1 Glpi 2025-04-20 6.0 MEDIUM 8.0 HIGH
Cross-Site Request Forgery (CSRF) vulnerability in GLPI 0.90.4 allows remote authenticated attackers to submit a request that could lead to the creation of an admin account in the application.
CVE-2015-7685 1 Glpi-project 1 Glpi 2025-04-12 4.0 MEDIUM N/A
GLPI before 0.85.3 allows remote authenticated users to create super-admin accounts by leveraging permissions to create a user and the _profiles_id parameter to front/user.form.php.
CVE-2013-2226 1 Glpi-project 1 Glpi 2025-04-12 7.5 HIGH N/A
Multiple SQL injection vulnerabilities in GLPI before 0.83.9 allow remote attackers to execute arbitrary SQL commands via the (1) users_id_assign parameter to ajax/ticketassigninformation.php, (2) filename parameter to front/document.form.php, or (3) table parameter to ajax/comments.php.
CVE-2014-9258 1 Glpi-project 1 Glpi 2025-04-12 6.5 MEDIUM N/A
SQL injection vulnerability in ajax/getDropdownValue.php in GLPI before 0.85.1 allows remote authenticated users to execute arbitrary SQL commands via the condition parameter.
CVE-2014-8360 1 Glpi-project 1 Glpi 2025-04-12 7.5 HIGH N/A
Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php.
CVE-2015-7684 1 Glpi-project 1 Glpi 2025-04-12 9.0 HIGH N/A
Unrestricted file upload in GLPI before 0.85.3 allows remote authenticated users to execute arbitrary code by adding a file with an executable extension as an attachment to a new ticket, then accessing it via a direct request to the file in files/_tmp/.
CVE-2013-2225 1 Glpi-project 1 Glpi 2025-04-12 6.4 MEDIUM N/A
inc/ticket.class.php in GLPI 0.83.9 and earlier allows remote attackers to unserialize arbitrary PHP objects via the _predefined_fields parameter to front/ticket.form.php.
CVE-2014-5032 1 Glpi-project 1 Glpi 2025-04-12 5.0 MEDIUM N/A
GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar.
CVE-2024-11955 1 Glpi-project 1 Glpi 2025-03-04 5.0 MEDIUM 4.3 MEDIUM
A vulnerability was found in GLPI up to 10.0.17. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument redirect leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.0.18 is able to address this issue. It is recommended to upgrade the affected component.
CVE-2024-38370 1 Glpi-project 1 Glpi 2025-02-10 N/A 5.3 MEDIUM
GLPI is a free asset and IT management software package. Starting in 9.2.0 and prior to 11.0.0, it is possible to download a document from the API without appropriate rights. Upgrade to 10.0.16.
CVE-2024-47758 1 Glpi-project 1 Glpi 2025-02-06 N/A 8.8 HIGH
GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch for this issue.
CVE-2024-29889 1 Glpi-project 1 Glpi 2025-01-28 N/A 7.1 HIGH
GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability in the saved searches feature to alter another user account data take control of it. This vulnerability is fixed in 10.0.15.
CVE-2024-47761 1 Glpi-project 1 Glpi 2025-01-23 N/A 7.2 HIGH
GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an administrator with access to the sent notifications contents can take control of an account with higher privileges. Version 10.0.17 contains a patch for this issue.
CVE-2024-47760 1 Glpi-project 1 Glpi 2025-01-23 N/A 8.8 HIGH
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.17, a technician with an access to the API can take control of an account with higher privileges. Version 10.0.17 contains a patch for this issue.
CVE-2024-47759 1 Glpi-project 1 Glpi 2025-01-23 N/A 4.8 MEDIUM
GLPI is a free Asset and IT management software package. An technician can upload a SVG containing a malicious script. The script will then be executed when any user will try to see the document contents. Upgrade to 10.0.17.
CVE-2024-48912 1 Glpi-project 1 Glpi 2025-01-10 N/A 8.1 HIGH
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.17, an authenticated user can use an application endpoint to delete any user account. Version 10.0.17 contains a patch for this issue.
CVE-2024-50339 1 Glpi-project 1 Glpi 2025-01-10 N/A 5.3 MEDIUM
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.17, an unauthenticated user can retrieve all the sessions IDs and use them to steal any valid session. Version 10.0.17 contains a patch for this issue.
CVE-2024-43416 1 Glpi-project 1 Glpi 2025-01-07 N/A 7.5 HIGH
GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.
CVE-2024-37149 1 Glpi-project 1 Glpi 2025-01-07 N/A 7.2 HIGH
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated technician user can upload a malicious PHP script and hijack the plugin loader to execute this malicious script. Upgrade to 10.0.16.