Total vulnerabilities in the database
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
Software | From | Fixed in |
---|---|---|
combodo / itop | 3.0.0-alpha | 3.0.0-alpha.x |
combodo / itop | 3.0.0-beta | 3.0.0-beta.x |
combodo / itop | 3.0.0-beta2 | 3.0.0-beta2.x |
combodo / itop | - | 2.7.1 |
combodo / itop | 3.0.0-beta3 | 3.0.0-beta3.x |
combodo / itop | 3.0.0-beta4 | 3.0.0-beta4.x |
combodo / itop | 3.0.0-beta5 | 3.0.0-beta5.x |
combodo / itop | 3.0.0-beta1 | 3.0.0-beta1.x |
combodo / itop | 3.0.0-beta6 | 3.0.0-beta6.x |
combodo / itop | 3.0.0-beta7 | 3.0.0-beta7.x |
combodo / itop | 3.0.0-beta8 | 3.0.0-beta8.x |
combodo / itop | 3.0.0-rc | 3.0.0-rc.x |