Пакет glpi: Информация

    Исходный пакет: glpi
    Версия: 10.0.15-alt1
    Последняя версия по данным Repology
    Собран:  26 апреля 2024 г. 23:25 в задании #345902
    Категория: Сети/Прочее
    Сообщить об ошибке в пакете
    Домашняя страница: http://www.glpi-project.org

    Лицензия: GPLv3
    О пакете: IT and asset management software
    Описание: 
    GLPI is the Information Resource-Manager with an additional Administration-
    Interface.
    You can use it to build up a database with an inventory for your company
    (computer, software, printers...).
    It has enhanced functions to make the daily life for the administrators easier,
    like a job-tracking-system with mail-notification and methods to build a
    database with basic information about your network-topology.

    Список rpm-пакетов, предоставляемых данным srpm-пакетом:
    glpi (noarch)
    glpi-apache2 (noarch)
    glpi-php8.1 (noarch)
    glpi-php8.2 (noarch)

    Сопровождающий: Pavel Zilke

    Список участников:
    Pavel Zilke

    Права:
    Pavel Zilke

      1. rpm-macros-webserver-common

    Последнее изменение


    26 апреля 2024 г. Pavel Zilke 10.0.15-alt1
    - New version 10.0.15
    - This release fixes a security issue that has been recently discovered. Update is recommended!
    - Security fixes:
     + CVE-2024-31456 Authenticated SQL injection from map search
     + CVE-2024-29889 Account takeover via SQL Injection in saved searches feature
    25 марта 2024 г. Pavel Zilke 10.0.14-alt1
    - New version 10.0.14
    - Due to a few regressions in the last (10.0.13), an early release is available.
    25 марта 2024 г. Pavel Zilke 10.0.13-alt1
    - New version 10.0.13
    - This release fixes a security issue that has been recently discovered. Update is recommended!
    - Security fixes:
     + CVE-2024-27096 : SQL Injection in through the search engine
     + CVE-2024-27098 : Blind SSRF using Arbitrary Object Instantiation
     + CVE-2024-27104 : Stored XSS in dashboards
     + CVE-2024-27914 : Reflected XSS in debug mode
     + CVE-2024-27930 : Sensitive fields access through dropdowns
     + CVE-2024-27937 : Users emails enumeration