0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: GLPi
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
GLPI 10.0.2 Command Injection Exploit
Comments:
0
6 561
Security Risk Critical
D
Download
C
CVE-2022-35914
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
5 381
Security Risk High
D
Download
C
CVE-2013-5696
Verified by 0day Admin
free
You can open this exploit for free
metasploit
Exploits:
1663
BusinessLevel:
94
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
2 560
Security Risk Critical
D
Download
C
CVE-2020-11060
Verified by 0day Admin
free
You can open this exploit for free
Brian Peters
Exploits:
3
BusinessLevel:
3
GLPI 9.5.7 - Username Enumeration Vulnerability
Comments:
0
3 573
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Rafael B.
Exploits:
1
BusinessLevel:
1
3 160
Security Risk Critical
D
Download
C
CVE-2022-34128
Verified by 0day Admin
free
You can open this exploit for free
Nuri Çilengir
Exploits:
9
BusinessLevel:
1
3 141
Security Risk High
D
Download
C
CVE-2022-31056
Verified by 0day Admin
free
You can open this exploit for free
Nuri Çilengir
Exploits:
9
BusinessLevel:
1
GLPI Activity v3.1.0 - Authenticated Local File Inclusion on Activity plugin Vulnerability
Comments:
0
3 136
Security Risk Medium
D
Download
C
CVE-2022-34125
Verified by 0day Admin
free
You can open this exploit for free
Nuri Çilengir
Exploits:
9
BusinessLevel:
1
3 142
Security Risk Medium
D
Download
C
CVE-2022-31068
Verified by 0day Admin
free
You can open this exploit for free
Nuri Çilengir
Exploits:
9
BusinessLevel:
1
3 109
Security Risk Medium
D
Download
C
CVE-2022-31062
Verified by 0day Admin
free
You can open this exploit for free
Nuri Çilengir
Exploits:
9
BusinessLevel:
1
GLPI 4.0.2 - Unauthenticated Local File Inclusion on Manageentities plugin Vulnerability
Comments:
0
3 120
Security Risk Medium
D
Download
C
CVE-2022-34127
Verified by 0day Admin
free
You can open this exploit for free
Nuri Çilengir
Exploits:
9
BusinessLevel:
1
4 867
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Joas Antonio
Exploits:
2
BusinessLevel:
3
GLPI 9.4.5 - Remote Code Execution Exploit
Comments:
0
1 872
Security Risk Critical
D
Download
C
CVE-2020-11060
Verified by 0day Admin
free
You can open this exploit for free
Brian Peters
Exploits:
3
BusinessLevel:
3
1 696
Security Risk Medium
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Vadym Soroka
Exploits:
1
BusinessLevel:
2
GLPI 0.90.4 - SQL Injection Vulnerability
Comments:
0
4 553
Security Risk High
D
Download
C
CVE-2016-7508
Verified by 0day Admin
free
You can open this exploit for free
Eric CARTER
Exploits:
1
BusinessLevel:
4
GLPi 0.90.2 - SQL Injection
Comments:
0
3 881
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
High-Tech Bridge
Exploits:
241
BusinessLevel:
19
4 036
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Raffaele Forte
Exploits:
2
BusinessLevel:
7
4 843
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Peter Stiehl
Exploits:
1
BusinessLevel:
5
GLPI 0.85 - Blind SQL Injection Vulnerability
Comments:
0
3 942
Security Risk Medium
D
Download
C
CVE-2014-9258
Verified by 0day Admin
free
You can open this exploit for free
Kacper Szurek
Exploits:
51
BusinessLevel:
8
GLPI 0.84.1 - Multiple Vulnerabilities
Comments:
0
6 347
Security Risk Critical
D
Download
C
CVE-2013-5696
Verified by 0day Admin
free
You can open this exploit for free
High-Tech Bridge
Exploits:
241
BusinessLevel:
19
4 537
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
Xavier Mehrenberger
Exploits:
1
BusinessLevel:
6
GLPI v0.83.8 - Multiple Vulnerabilities
Comments:
0
4 646
Security Risk Critical
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48
GLPI 0.83.8 SQL Injection Vulnerability
Comments:
0
6 015
Security Risk High
D
Download
-
Verified by 0day Admin
free
You can open this exploit for free
LiquidWorm
Exploits:
761
BusinessLevel:
48