Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2011-2720

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-05 Aug, 2011 | 21:00
Updated At-06 Aug, 2024 | 23:08
Rejected At-
Credits

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:05 Aug, 2011 | 21:00
Updated At:06 Aug, 2024 | 23:08
Rejected At:
▼CVE Numbering Authority (CNA)

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://forge.indepnet.net/issues/3017
x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=726185
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/repository/revisions/14956
x_refsource_CONFIRM
http://secunia.com/advisories/45542
third-party-advisory
x_refsource_SECUNIA
https://forge.indepnet.net/projects/glpi/repository/revisions/14951
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/26/11
mailing-list
x_refsource_MLIST
https://forge.indepnet.net/projects/glpi/repository/revisions/14957
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/25/7
mailing-list
x_refsource_MLIST
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
vendor-advisory
x_refsource_MANDRIVA
https://forge.indepnet.net/projects/glpi/repository/revisions/14958
x_refsource_CONFIRM
http://www.securityfocus.com/bid/48884
vdb-entry
x_refsource_BID
https://forge.indepnet.net/projects/glpi/repository/revisions/14955
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/repository/revisions/14966
x_refsource_CONFIRM
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
vendor-advisory
x_refsource_FEDORA
https://forge.indepnet.net/projects/glpi/repository/revisions/14960
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/repository/revisions/14954
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/45366
third-party-advisory
x_refsource_SECUNIA
https://forge.indepnet.net/projects/glpi/repository/revisions/14952
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/versions/605
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/issues/3017
Resource:
x_refsource_CONFIRM
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/45542
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/48884
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/45366
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://forge.indepnet.net/issues/3017
x_refsource_CONFIRM
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=726185
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14956
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/45542
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14951
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/26/11
mailing-list
x_refsource_MLIST
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14957
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/25/7
mailing-list
x_refsource_MLIST
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14958
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/48884
vdb-entry
x_refsource_BID
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14955
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14966
x_refsource_CONFIRM
x_transferred
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14960
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14954
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/45366
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14952
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/versions/605
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/issues/3017
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/45542
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/48884
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/45366
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:05 Aug, 2011 | 21:55
Updated At:11 Apr, 2025 | 00:51

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

GLPI Project
glpi-project
>>glpi>>Versions up to 0.80.1(inclusive)
cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.5
cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.5
cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.5
cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.42
cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.51
cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.51a
cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.65
cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.65
cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.65
cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68.1
cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68.2
cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68.3
cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70.1
cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70.2
cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71
cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.2
cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.3
cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.4
cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.5
cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.6
cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.1
cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.2
cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.3
cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.4
cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78
cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.1
cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.2
cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.3
cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.4
cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/45366secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/45542secalert@redhat.com
N/A
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=ensecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2011/07/25/7secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/26/11secalert@redhat.com
Patch
http://www.securityfocus.com/bid/48884secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=726185secalert@redhat.com
Patch
https://forge.indepnet.net/issues/3017secalert@redhat.com
N/A
https://forge.indepnet.net/projects/glpi/repository/revisions/14951secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14952secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14954secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14955secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14956secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14957secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14958secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14960secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14966secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/versions/605secalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/45366af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/45542af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=enaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2011/07/25/7af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/26/11af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/48884af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=726185af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/issues/3017af854a3a-2127-422b-91ae-364da2661108
N/A
https://forge.indepnet.net/projects/glpi/repository/revisions/14951af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14952af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14954af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14955af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14956af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14957af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14958af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14960af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14966af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/versions/605af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/45366
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/45542
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/48884
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/issues/3017
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/45366
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/45542
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/48884
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/issues/3017
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2741Records found

CVE-2022-31068
Matching Score-10
Assigner-GitHub, Inc.
ShareView Details
Matching Score-10
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.42% / 61.04%
||
7 Day CHG~0.00%
Published-28 Jun, 2022 | 17:50
Updated-23 Apr, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive Data Exposure on Refused Inventory Files in GLPI

GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-39211
Matching Score-10
Assigner-GitHub, Inc.
ShareView Details
Matching Score-10
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-54.40% / 97.94%
||
7 Day CHG~0.00%
Published-15 Sep, 2021 | 16:55
Updated-04 Aug, 2024 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Disclosure of GLPI and server information in telemetry endpoint

GLPI is a free Asset and IT management software package. Starting in version 9.2 and prior to version 9.5.6, the telemetry endpoint discloses GLPI and server information. This issue is fixed in version 9.5.6. As a workaround, remove the file `ajax/telemetry.php`, which is not needed for usual functions of GLPI.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-5032
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.39% / 59.10%
||
7 Day CHG~0.00%
Published-14 Apr, 2015 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar.

Action-Not Available
Vendor-n/aGLPI Project
Product-glpin/a
CVE-2013-2227
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-31.19% / 96.60%
||
7 Day CHG~0.00%
Published-01 Nov, 2019 | 16:50
Updated-06 Aug, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GLPI 0.83.7 has Local File Inclusion in common.tabs.php.

Action-Not Available
Vendor-GLPI ProjectDebian GNU/Linux
Product-debian_linuxglpiGLPI
CWE ID-CWE-20
Improper Input Validation
CVE-2022-31062
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-20.72% / 95.38%
||
7 Day CHG~0.00%
Published-20 Jun, 2022 | 00:00
Updated-23 Apr, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Local File Inclusion

### Impact A plugin public script can be used to read content of system files. ### Patches Upgrade to version 1.0.2. ### Workarounds `b/deploy/index.php` file can be deleted if deploy feature is not used.

Action-Not Available
Vendor-GLPI Project
Product-glpi_inventoryglpi-inventory-plugin
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-15226
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5||MEDIUM
EPSS-0.29% / 52.21%
||
7 Day CHG~0.00%
Published-07 Oct, 2020 | 19:20
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection in GLPI Search API

In GLPI before version 9.5.2, there is a SQL Injection in the API's search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9.5.2. A proof-of-concept with technical details is available in the linked advisory.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2020-15176
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.28% / 51.06%
||
7 Day CHG~0.00%
Published-07 Oct, 2020 | 18:55
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL injection in GLPI

In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2020-11031
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 16.96%
||
7 Day CHG~0.00%
Published-23 Sep, 2020 | 15:20
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure encryption algorithm in GLPI

In GLPI before version 9.5.0, the encryption algorithm used is insecure. The security of the data encrypted relies on the password used, if a user sets a weak/predictable password, an attacker could decrypt data. This is fixed in version 9.5.0 by using a more secure encryption library. The library chosen is sodium.

Action-Not Available
Vendor-GLPI Project
Product-glpiGLPI
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2021-43778
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-84.16% / 99.26%
||
7 Day CHG~0.00%
Published-24 Nov, 2021 | 18:50
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path traversal in GLPI barcode plugin

Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.

Action-Not Available
Vendor-GLPI Project
Product-barcodebarcode
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-5248
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-7.2||HIGH
EPSS-2.84% / 85.66%
||
7 Day CHG~0.00%
Published-12 May, 2020 | 16:05
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Public GLPIKEY can be used to decrypt any data in GLPI

GLPI before before version 9.4.6 has a vulnerability involving a default encryption key. GLPIKEY is public and is used on every instance. This means anyone can decrypt sensitive data stored using this key. It is possible to change the key before installing GLPI. But on existing instances, data must be reencrypted with the new key. Problem is we can not know which columns or rows in the database are using that; espcially from plugins. Changing the key without updating data would lend in bad password sent from glpi; but storing them again from the UI will work.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2020-15217
Matching Score-8
Assigner-GitHub, Inc.
ShareView Details
Matching Score-8
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 46.11%
||
7 Day CHG~0.00%
Published-07 Oct, 2020 | 19:10
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User data exposure in GLPI

In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-41323
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.42% / 61.25%
||
7 Day CHG~0.00%
Published-26 Sep, 2023 | 22:35
Updated-23 Sep, 2024 | 20:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Users login enumeration by unauthenticated user in GLPI

GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-25192
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 23.25%
||
7 Day CHG~0.00%
Published-25 Feb, 2025 | 17:58
Updated-18 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GLPI allows unauthorized access to debug mode

GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-21626
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.08% / 24.24%
||
7 Day CHG~0.00%
Published-25 Feb, 2025 | 15:37
Updated-04 Mar, 2025 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GLPI vulnerable to exposure of sensitive information in the `status.php` endpoint

GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-34125
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-1.69% / 81.46%
||
7 Day CHG~0.00%
Published-16 Apr, 2023 | 00:00
Updated-06 Feb, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.

Action-Not Available
Vendor-n/aGLPI Project
Product-cmdbn/a
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-31143
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 33.74%
||
7 Day CHG~0.00%
Published-14 Sep, 2022 | 17:40
Updated-23 Apr, 2025 | 17:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Leak of sensitive information through login page error in GLPI

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-41321
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.27% / 50.20%
||
7 Day CHG~0.00%
Published-26 Sep, 2023 | 21:16
Updated-23 Sep, 2024 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive fields enumeration through API in GLPI

GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-24867
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.34% / 56.11%
||
7 Day CHG~0.00%
Published-21 Apr, 2022 | 16:50
Updated-23 Apr, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LDAP password exposure in glpi

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-11033
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.45% / 62.53%
||
7 Day CHG~0.00%
Published-05 May, 2020 | 21:15
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Able to read any token through API user endpoint in GLPI

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

Action-Not Available
Vendor-GLPI ProjectFedora Project
Product-fedoraglpiGLPI
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-14666
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-3.00% / 86.03%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 19:19
Updated-05 Aug, 2024 | 00:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.

Action-Not Available
Vendor-n/aGLPI Project
Product-glpin/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-43416
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-4.68% / 88.91%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 16:27
Updated-07 Jan, 2025 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GLPI vulnerable to enumeration of users' email addresses by unauthenticated user

GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpiglpi
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-4748
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.23% / 45.75%
||
7 Day CHG~0.00%
Published-16 Dec, 2011 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote attackers to obtain potentially sensitive information by reading a page, as demonstrated by js/ajax/core/ajax.inc.js and certain other files.

Action-Not Available
Vendor-n/aParallels International GmbhRed Hat, Inc.
Product-enterprise_linuxparallels_plesk_paneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-1787
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 58.31%
||
7 Day CHG~0.00%
Published-24 Mar, 2016 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wiki Server in Apple OS X Server before 5.1 allows remote attackers to obtain sensitive information from Wiki pages via unspecified vectors.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3728
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-23 Sep, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dolphin 7.0.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by xmlrpc/BxDolXMLRPCProfileView.php and certain other files.

Action-Not Available
Vendor-boonexn/a
Product-dolphinn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-1910
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-8.82% / 92.17%
||
7 Day CHG~0.00%
Published-15 Jan, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The User Management Engine (UME) in SAP NetWeaver 7.4 allows attackers to decrypt unspecified data via unknown vectors, aka SAP Security Note 2191290.

Action-Not Available
Vendor-n/aSAP SE
Product-netweavern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3705
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-23 Sep, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arctic Fox CMS 0.9.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by acp/includes/edit.inc.php and certain other files.

Action-Not Available
Vendor-michael_armbrustern/a
Product-arctic_fox_cmsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3806
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TCExam 11.1.015 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by public/code/tce_page_footer.php and certain other files.

Action-Not Available
Vendor-tecnickn/a
Product-tcexamn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-2055
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-68.00% / 98.53%
||
7 Day CHG~0.00%
Published-13 Apr, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

xymond/xymond.c in xymond in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 allow remote attackers to read arbitrary files in the configuration directory via a "config" command.

Action-Not Available
Vendor-xymonn/aDebian GNU/Linux
Product-debian_linuxxymonn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3796
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PrestaShop 1.4.0.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by product-sort.php and certain other files.

Action-Not Available
Vendor-n/aPrestaShop S.A
Product-prestashopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-2859
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.25% / 48.19%
||
7 Day CHG~0.00%
Published-23 Jul, 2010 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

news.php in SimpNews 2.47.3 and earlier allows remote attackers to obtain sensitive information via an invalid lang parameter, which reveals the installation path in an error message.

Action-Not Available
Vendor-boesch-itn/a
Product-simpnewsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3757
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.26% / 49.12%
||
7 Day CHG~0.00%
Published-23 Sep, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Moodle 2.0.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by webservice/xmlrpc/locallib.php and certain other files.

Action-Not Available
Vendor-n/aMoodle Pty Ltd
Product-moodlen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-2758
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.72% / 71.61%
||
7 Day CHG~0.00%
Published-13 Aug, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bugzilla 2.17.1 through 3.2.7, 3.3.1 through 3.4.7, 3.5.1 through 3.6.1, and 3.7 through 3.7.2 generates different error messages depending on whether a product exists, which makes it easier for remote attackers to guess product names via unspecified use of the (1) Reports or (2) Duplicates page.

Action-Not Available
Vendor-n/aMozilla Corporation
Product-bugzillan/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-1864
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.55% / 66.94%
||
7 Day CHG-0.04%
Published-19 Jun, 2016 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The XSS auditor in WebKit, as used in Apple iOS before 9.3 and Safari before 9.1, does not properly handle redirects in block mode, which allows remote attackers to obtain sensitive information via a crafted URL.

Action-Not Available
Vendor-n/aApple Inc.
Product-safariiphone_osn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3788
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PhpSecInfo 0.2.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by Test/Test_Suhosin.php and certain other files.

Action-Not Available
Vendor-phpsecn/a
Product-phpsecinfon/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3750
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-23 Sep, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

kPlaylist 1.8.502 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by getid3/getid3/write.id3v1.php and certain other files.

Action-Not Available
Vendor-kplaylistn/a
Product-kplaylistn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3762
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.32% / 54.32%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenBlog 1.2.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by system/scaffolding/views/view.php and certain other files.

Action-Not Available
Vendor-open-blogn/a
Product-openblogn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3717
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-23 Sep, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ClipBucket 2.0.9 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by plugins/signup_captcha/signup_captcha.php and certain other files.

Action-Not Available
Vendor-clip-bucketn/a
Product-clipbucketn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-4759
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.23% / 45.75%
||
7 Day CHG~0.00%
Published-16 Dec, 2011 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Parallels Plesk Small Business Panel 10.2.0 generates web pages containing external links in response to GET requests with query strings for client@1/domain@1/hosting/file-manager/ and certain other files, which makes it easier for remote attackers to obtain sensitive information by reading (1) web-server access logs or (2) web-server Referer logs, related to a "cross-domain Referer leakage" issue.

Action-Not Available
Vendor-n/aParallels International Gmbh
Product-parallels_plesk_small_business_paneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2002-0596
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.71% / 71.23%
||
7 Day CHG~0.00%
Published-11 Jun, 2002 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebTrends Reporting Center 4.0d allows remote attackers to determine the real path of the web server via a GET request to get_od_toc.pl with an empty Profile parameter, which leaks the pathname in an error message.

Action-Not Available
Vendor-webtrendsn/a
Product-reporting_centern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-4538
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.95%
||
7 Day CHG~0.00%
Published-09 Mar, 2020 | 18:09
Updated-07 Aug, 2024 | 00:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lexmark X, W, T, E, and C devices before 2012-02-09 allow attackers to obtain sensitive information by reading passwords within exported settings.

Action-Not Available
Vendor-n/aLexmark International, Inc.
Product-x736_firmwarew850_firmwarex546_firmwaree460_firmwarec543_firmwarex546x363x738_firmwarex364_firmwarex734x466t654_firmwarec540_firmwarex544_firmwaree260x736x864_firmwarec544x464_firmwarex466_firmwaret650_firmwarex651x543_firmwarec544_firmwarex544t654x656_firmwarec546c546_firmwaree460x656c736_firmwarex363_firmwaret652_firmwarex862_firmwaret650x864x658e360x862w850e360_firmwarec734x463_firmwarex654x860x860_firmwarex543x364c543x658_firmwaret652x738c736x463c734_firmwarex464x651_firmwarex652_firmwarex734_firmwaree462_firmwarex654_firmwaree260_firmwaree462c540x652n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-9852
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.46% / 63.17%
||
7 Day CHG~0.00%
Published-08 Apr, 2018 | 02:00
Updated-16 Sep, 2024 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Gxlcms QY v1.0.0713, Lib\Lib\Action\Home\HitsAction.class.php allows remote attackers to read data from a database by embedding a FROM clause in a query string within a Home-Hits request, as demonstrated hy sid=user,password%20from%20mysql.user%23.

Action-Not Available
Vendor-gxlcmsn/a
Product-gxlcms_qyn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3823
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Yamamah 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by themes/default/index.php and certain other files.

Action-Not Available
Vendor-yamamahn/a
Product-yamamahn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3826
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zikula 1.2.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by themes/voodoodolly/version.php and certain other files.

Action-Not Available
Vendor-zikulan/a
Product-zikulan/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3784
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Francisco Burzi PHP-Nuke 8.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by themes/Odyssey/theme.php and certain other files.

Action-Not Available
Vendor-phpnuken/a
Product-php-nuken/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-9922
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.95%
||
7 Day CHG~0.00%
Published-10 Apr, 2018 | 06:00
Updated-05 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in idreamsoft iCMS through 7.0.7. Physical path leakage exists via an invalid nickname field that reveals a core/library/weixin.class.php pathname.

Action-Not Available
Vendor-icmsdevn/a
Product-icmsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-3062
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.79% / 72.86%
||
7 Day CHG~0.00%
Published-20 Aug, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.

Action-Not Available
Vendor-n/aThe PHP Group
Product-phpn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3805
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-24 Sep, 2011 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TaskFreak! multi-mysql-0.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by include/language/zh/register_info.php and certain other files.

Action-Not Available
Vendor-taskfreakn/a
Product-taskfreak\!_multi-mysqln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-0338
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.05%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 13:49
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During an OData V2/V4 request in SAP Gateway, versions 750, 751, 752, 753, the HTTP Header attributes cache-control and pragma were not properly set, allowing an attacker to access restricted information, resulting in Information Disclosure.

Action-Not Available
Vendor-SAP SE
Product-gatewaySAP Gateway
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3738
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-23 Sep, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Feng Office 1.7.2 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by public/upgrade/templates/layout.php and certain other files.

Action-Not Available
Vendor-fengofficen/a
Product-feng_officen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-3749
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.28% / 51.24%
||
7 Day CHG~0.00%
Published-23 Sep, 2011 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ka-Map 1.0-20070205 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by test.php and certain other files.

Action-Not Available
Vendor-maptoolsn/a
Product-ka-mapn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 54
  • 55
  • Next
Details not found