Show filters
2,684 Total Results
Displaying 11-20 of 2,684
Sort by:
Attacker Value
High
CVE-2021-21326
Disclosure Date: March 08, 2021 (last updated February 22, 2025)
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 it is possible to create tickets for another user with self-service interface without delegatee systems enabled. This is fixed in version 9.5.4.
1
Attacker Value
Moderate
CVE-2021-21255
Disclosure Date: March 02, 2021 (last updated February 22, 2025)
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI version 9.5.3, it was possible to switch entities with IDOR from a logged in user. This is fixed in version 9.5.4.
1
Attacker Value
Very High
CVE-2020-11108
Disclosure Date: May 11, 2020 (last updated February 21, 2025)
The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to upload arbitrary files. This can be abused for Remote Code Execution by writing to a PHP file in the web directory. (Also, it can be used in conjunction with the sudo rule for the www-data user to escalate privileges to root.) The code error is in gravity_DownloadBlocklistFromUrl in gravity.sh.
1
Attacker Value
Unknown
CVE-2023-28700
Disclosure Date: May 30, 2023 (last updated February 25, 2025)
OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
1
Attacker Value
Low
CVE-2020-7350
Disclosure Date: April 16, 2020 (last updated February 21, 2025)
Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploit from a variety of sources and trigger a command injection on the operator's terminal. Note, only the Metasploit Framework and products that expose the plugin system is susceptible to this issue -- notably, this does not include Rapid7 Metasploit Pro. Also note, this vulnerability cannot be triggered through a normal scan operation -- the attacker would have to supply a file that is processed with the db_import command.
0
Attacker Value
Very High
Serpico admin user can be accessed without admin creds
Disclosure Date: January 15, 2020 (last updated February 21, 2025)
An issue was discovered in Serpico (aka SimplE RePort wrIting and CollaboratiOn tool) 1.3.0. An admin can change their password without providing the current password, by using interfaces outside the Change Password screen. Thus, requiring the admin to enter an Old Password value on the Change Password screen does not enhance security. This is problematic in conjunction with XSS.
0
Attacker Value
Very Low
Metasploit Pro 4.16 and earlier install the web server SSL server.key as local-…
Disclosure Date: November 06, 2019 (last updated November 27, 2024)
Rapid7 Metasploit Pro version 4.16.0-2019081901 and prior suffers from an instance of CWE-732, wherein the unique server.key is written to the file system during installation with world-readable permissions. This can allow other users of the same system where Metasploit Pro is installed to intercept otherwise private communications to the Metasploit Pro web interface.
0
Attacker Value
Unknown
CVE-2025-25192
Disclosure Date: February 25, 2025 (last updated February 26, 2025)
GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file.
0
Attacker Value
Unknown
CVE-2025-23046
Disclosure Date: February 25, 2025 (last updated February 26, 2025)
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a "Mail servers" authentication provider is configured to use an Oauth connection provided by the OauthIMAP plugin, anyone can connect to GLPI using a user name on which an Oauth authorization has already been established. Version 10.0.18 contains a patch. As a workaround, one may disable any "Mail servers" authentication provider configured to use an Oauth connection provided by the OauthIMAP plugin.
0
Attacker Value
Unknown
CVE-2025-23024
Disclosure Date: February 25, 2025 (last updated February 26, 2025)
GLPI is a free asset and IT management software package. Starting in version 0.72 and prior to version 10.0.18, an anonymous user can disable all the active plugins. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file.
0