glpi vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the glpi package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

*
  • L
Use of a Broken or Risky Cryptographic Algorithm

*
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
SQL Injection

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Arbitrary Code Injection

*
  • M
Open Redirect

*
  • M
Cross-site Scripting (XSS)

*
  • M
Use of Hard-coded Credentials

*
  • M
Cross-site Scripting (XSS)

*
  • M
Missing Authorization

*
  • M
Arbitrary Code Injection

*
  • L
Authorization Bypass Through User-Controlled Key

*
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • L
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Exposure of Resource to Wrong Sphere

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Arbitrary Code Injection

*
  • L
OS Command Injection

*
  • M
SQL Injection

*
  • M
CVE-2022-31068

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
Information Exposure

*
  • L
Cross-site Scripting (XSS)

*
  • L
SQL Injection

*
  • L
Cross-site Scripting (XSS)

*
  • L
Server-Side Request Forgery (SSRF)

*
  • L
SQL Injection

*
  • M
Incorrect Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
SQL Injection

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Files or Directories Accessible to External Parties

*
  • L
SQL Injection

*
  • L
Arbitrary Code Injection

*
  • M
SQL Injection

*
  • M
Improper Input Validation

*
  • M
SQL Injection

*
  • M
SQL Injection

*
  • L
SQL Injection

*
  • M
SQL Injection

*
  • M
CVE-2015-7684

*
  • M
Access Restriction Bypass

*
  • M
SQL Injection

*